CVE-2025-54807

9.8CRITICAL

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access

게시됨: 9/18/2025업데이트됨: 9/19/2025

설명

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.

AI 분석AI 기반

참조