CVE-2025-64091

8.6HIGH

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

Veröffentlicht: 1/9/2026Aktualisiert: 1/13/2026

Beschreibung

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

KI-AnalyseKI-gestützt

Referenzen