2025-04-15 21:25:26
icscert
PUBLISHED
An unauthenticated attacker can hijack other users devices and potentially control them.