2025-04-15 21:03:24
icscert
PUBLISHED
Unauthenticated attackers can obtain restricted information about a users smart device collections (i.e., "rooms").