2022-06-30 18:42:40
icscert
PUBLISHED
By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations.