CVE-2025-41652
27.05.2025, 09:15
The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.