2025-04-15 21:57:28
icscert
PUBLISHED
Unauthenticated attackers can add devices of other users to their scenes (or arbitrary scenes of other arbitrary users).