2024-06-13 17:00:20
icscert
PUBLISHED
The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes.