2025-12-10 17:15:54
icscert
PUBLISHED
A malicious actor can access camera configuration information, including account credentials, without authenticating when accessing a vulnerable URL.