An unauthenticated remote attacker can alter the device...
Critical severity
Unreviewed
Published
Jul 8, 2025
to the GitHub Advisory Database
Description
Published by the National Vulnerability Database
Jul 8, 2025
Published to the GitHub Advisory Database
Jul 8, 2025
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
References