A remote unauthenticated attacker may use default...
Critical severity
Unreviewed
Published
Jul 7, 2025
to the GitHub Advisory Database
•
Updated Jul 7, 2025
Description
Published by the National Vulnerability Database
Jul 7, 2025
Published to the GitHub Advisory Database
Jul 7, 2025
Last updated
Jul 7, 2025
A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices.
References