up.time Software Administration Interface Remote Authentication Bypass Vulnerability

Summary
up.time software is prone to a remote authentication-bypass vulnerability. Attackers can exploit this issue to bypass authentication and perform unauthorized actions. up.time 5 is vulnerable other versions may also be affected.
References