An attacker with access to the network where the...
Moderate severity
Unreviewed
Published
Mar 28, 2025
to the GitHub Advisory Database
•
Updated Mar 28, 2025
Description
Published by the National Vulnerability Database
Mar 28, 2025
Published to the GitHub Advisory Database
Mar 28, 2025
Last updated
Mar 28, 2025
An attacker with access to the network where the vulnerable device is located could capture traffic and obtain cookies from the user, allowing them to steal a user's active session and make changes to the device via the web, depending on the privileges obtained by the user.
References