An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.
Link | Tags |
---|---|
https://certvde.com/de/advisories/VDE-2025-019 | third party advisory |