2025-03-05 08:03:09
CERTVDE
PUBLISHED
An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.