CVE-2025-64091

8.6HIGH

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

Publicado: 1/9/2026Actualizado: 1/13/2026

Descripción

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

Análisis IAImpulsado por IA

Referencias