An unauthenticated remote attacker can gain access to the cloud API due to a lack of authentication for a critical function in the affected devices. Availability is not affected.
No PoCs from references.
- https://github.com/fkie-cad/nvd-json-data-feeds