| ID | CVE-2026-3587 | ||||||
| Sažetak | An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device. | ||||||
| Reference | |||||||
| CVSS |
|
||||||
| Pristup |
|
||||||
| Impact |
|
||||||
| CVSS vektor | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | ||||||
| Zadnje važnije ažuriranje | 24-03-2026 - 08:16 | ||||||
| Objavljeno | 23-03-2026 - 08:16 |

