CVE-2025-54807

9.8CRITICAL

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access

发布于: 9/18/2025更新于: 9/19/2025

描述

The secret used for validating authentication tokens is hardcoded in device firmware for affected versions. An attacker who obtains the signing key can bypass authentication, gaining complete access to the system.

AI分析AI驱动

参考资料