First published: Thu Apr 18 2024(Updated: )
The device allows an unauthenticated attacker to bypass authentication and modify the cookie to reveal hidden pages that allows more critical operations to the transmitter.
Credit: ics-cert@hq.dhs.gov
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.