An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into the server username and/or password
fields of the restore action in the API V1 route.
Alternatively, a user logged into an XWEB Pro with internet access can
update XWEB Pro directly from Copeland servers via the menu SYSTEM --
Updates | Network.