A vulnerability was found in filestash 0.4. It has been classified as problematic. This affects the function
ssh.InsecureIgnoreHostKey
of the component Host Key Verification Handler. The manipulation leads to channel accessible by non-endpoint.
This vulnerability is uniquely identified as CVE-2024-41258. It is possible to initiate the attack remotely. There is no exploit available.