CVE-2025-54807

9.8CRITICAL

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access

公開日: 9/18/2025更新日: 9/19/2025

説明

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.

AI分析AIによる分析

参照