2025-04-15 21:09:29
icscert
PUBLISHED
Unauthenticated attackers can query an API endpoint and get device details.