The vulnerability allows a successful attacker to bypass the integrity check of FW uploaded to the free@home System Access Point.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.