2024-02-13 13:46:31
CERTVDE
PUBLISHED
An unauthenticated remote attacker can use an uncontrolled resource consumption vulnerability to DoS the affected devices through excessive traffic on a single ethernet port.