Adversaries may execute their own malicious payloads by hijacking vulnerable file path references.
Sub-technique of
T1574
See: MITRE ATT&CK
Adversaries may execute their own malicious payloads by hijacking vulnerable file path references.
Sub-technique of
T1574
See: MITRE ATT&CK