2025-06-06 14:42:31
CERTVDE
PUBLISHED
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device