An attacker could exploit this vulnerability by uploading arbitrary files via the a specific endpoint, leading to unauthorized remote code execution or system compromise.
https://www.hipaajournal.com/infinitt-pacs-vulnerabilities-2025/
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-100-01
Source: Mitre, NVD
Published: 2025-04-11