2024-08-13 12:30:33
CERTVDE
PUBLISHED
An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.