2025-04-15 21:12:13
icscert
PUBLISHED
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).