A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified.
https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json