CVE-2025-54807

Publication date

2025-09-18 20:44:04

Family

icscert

State

PUBLISHED

Description

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.