2023-09-18 19:29:58
icscert
PUBLISHED
Sending some requests in the web application of the vulnerable device allows information to be obtained due to the lack of security in the authentication process.