This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
https://www.zenitel.com/sites/default/files/2025-12/A100K12333%20Zenitel%20Security%20Advisory.pdf
https://wiki.zenitel.com/wiki/ZIPS_9.3_-_Release_notes
https://wiki.zenitel.com/wiki/VSF-Fortitude8_9.3_Release_Notes
https://wiki.zenitel.com/wiki/VSF-Fortitude6_9.3_Release_Notes
https://wiki.zenitel.com/wiki/VSF-Display_Series_9.3_Release_Notes