Total vulnerabilities in the database
Credentials to access device configuration information stored unencrypted in flash memory. These credentials would allow read-only access to network configuration information and terminal configuration data.
Software | From | Fixed in |
---|---|---|
echostar / fusion | - | 2.7.0.10 |