2026-01-09 09:59:58
NCSC-NL
PUBLISHED
This vulnerability allows authenticated attackers to execute commands via the hostname of the device.