2023-12-19 23:18:26
icscert
PUBLISHED
Through the exploitation of active user sessions, an attacker could send custom requests to cause a denial-of-service condition on the device.