| 概要 | Altai Technologies Ltd Altai IX500 Indoor 22 802.11ac Wave 2 AP After login, there are file reads in the background, and attackers can obtain sensitive information such as user credentials, system configuration, and database connection strings, which can lead to data breaches and identity theft. |
|---|---|
| 公表日 | 2024年11月2日1:15 |
| 登録日 | 2024年11月2日5:00 |
| 最終更新日 | 2024年11月6日3:35 |