2025-04-15 20:28:53
icscert
PUBLISHED
An unauthenticated attacker can obtain a list of smart devices by knowing a valid username.