2025-04-15 21:05:11
icscert
PUBLISHED
Unauthenticated attackers can obtain restricted information about a users smart device collections (i.e., "scenes").