2024-07-10 07:37:03
CERTVDE
PUBLISHED
An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.