2025-05-27 08:37:26
CERTVDE
PUBLISHED
An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices.