An adjacent attacker without authentication can exploit...
High severity
Unreviewed
Published
Sep 18, 2025
to the GitHub Advisory Database
•
Updated Sep 18, 2025
Description
Published by the National Vulnerability Database
Sep 18, 2025
Published to the GitHub Advisory Database
Sep 18, 2025
Last updated
Sep 18, 2025
An adjacent attacker without authentication can exploit this
vulnerability to retrieve a set of user-privileged credentials. These
credentials are present during the firmware upgrade procedure.
References