2025-12-17 15:53:04
jci
PUBLISHED
Successful exploitation of these vulnerabilities could allow an attacker to modify firmware and gain full access to the device.