A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
2025-07-08T07:15:25.630
2025-07-08T16:18:14.207
Awaiting Analysis
CVSSv3.1: 8.8 (HIGH)
-