| Summary | The device enables an unauthorized attacker to execute system commands with elevated privileges. This exploit is facilitated through the use of the 'getcommand' query within the application, allowing the attacker to gain root access. |
|---|---|
| Publication Date | Sept. 27, 2024, 2:15 a.m. |
| Registration Date | Sept. 27, 2024, 5 a.m. |
| Last Update | Sept. 30, 2024, 9:46 p.m. |