2025-04-15 20:19:24
icscert
PUBLISHED
An authenticated attacker can obtain any plant name by knowing the plant ID.