2025-03-18 11:03:49
CERTVDE
PUBLISHED
An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected.