2026-03-10 08:26:48
CERTVDE
PUBLISHED
An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.