An unauthenticated remote attacker can bypass the login...
Critical severity
Unreviewed
Published
Jul 1, 2025
to the GitHub Advisory Database
•
Updated Jul 1, 2025
Description
Published by the National Vulnerability Database
Jul 1, 2025
Published to the GitHub Advisory Database
Jul 1, 2025
Last updated
Jul 1, 2025
An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
References