2024-04-18 22:10:42
icscert
PUBLISHED
The device allows an unauthenticated attacker to bypass authentication and modify the cookie to reveal hidden pages that allows more critical operations to the transmitter.