| ID | CVE-2025-64090 | ||||||
| Sažetak | This vulnerability allows authenticated attackers to execute commands via the hostname of the device. | ||||||
| Reference | |||||||
| CVSS |
|
||||||
| Pristup |
|
||||||
| Impact |
|
||||||
| CVSS vektor | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | ||||||
| Zadnje važnije ažuriranje | 13-01-2026 - 14:03 | ||||||
| Objavljeno | 09-01-2026 - 10:15 |

