CVE-2025-25276
15.04.2025, 22:15
An unauthenticated attacker can hijack other users' devices and potentially control them.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Common Weakness Enumeration
An unauthenticated attacker can hijack other users' devices and potentially control them.Enginsight