This vulnerability potentially allows unauthorized...
Moderate severity
Unreviewed
Published
Mar 14, 2024
to the GitHub Advisory Database
•
Updated Sep 26, 2024
Description
Published by the National Vulnerability Database
Mar 14, 2024
Published to the GitHub Advisory Database
Mar 14, 2024
Last updated
Sep 26, 2024
This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state.
References