2025-03-26 14:58:09
bizerba
PUBLISHED
An authenticated attacker can compromise the availability of the device via the network