Other flaws include allowing unauthenticated attackers to access system logs, using hardcoded shared private keys for SSH and a buffer overflow which could allow attackers to execute code. All vulnerabilities except the buffer overflow were patched in recent updates.
These have likely arisen due to a lack of security in mind during the development of the software used which is not uncommon for IoT devices.
Source: Thehackernews
Artificial intelligence is transforming how organisations operate, innovate and deliver value. As AI becomes woven…
Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…
Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…