2024-01-10 13:00:29
bosch
PUBLISHED
The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.