2025-04-15 21:43:15
icscert
PUBLISHED
An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.