Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.
Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.