A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices.
2025-07-07T07:15:23.973
2025-07-08T16:18:34.923
Awaiting Analysis
[email protected]
CVSSv3.1: 10.0 (CRITICAL)
-