2025-04-15 21:45:46
icscert
PUBLISHED
Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off).