By using a specific credential string, an attacker with network access to the device’s web interface could circumvent the authentication scheme and perform administrative operations.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
exemys rme1 firmware |