2025-04-15 21:48:21
icscert
PUBLISHED
Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users.