CVE-2025-27595
14.03.2025, 13:15
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
References