2025-11-18 10:18:00
CERTVDE
PUBLISHED
An unauthenticated remote attacker can execute arbitrary php files and gain full access of the affected devices.