CVE-2025-64091

8.6HIGH

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

Опубликовано: 1/9/2026Обновлено: 1/13/2026

Описание

This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.

ИИ-АнализНа базе ИИ

Ссылки