2024-08-13 12:32:37
CERTVDE
PUBLISHED
An unauthenticated remote attacker may use a reflected XSS vulnerability to obtain information from a user or reboot the affected device once.