2025-06-24 02:16:21
CSA
PUBLISHED
Successful exploitation of the vulnerability could allow an attacker that has physical access to interface with JTAG to inject or modify firmware.