Total vulnerabilities in the database
Successful exploitation of these vulnerabilities could allow an attacker to modify firmware and gain full access to the device.
No technical information available.
CWEs:
OWASP TOP 10:
No affected software listed.
SynScan provides clear, real-time security insights so you can monitor your attack surface, spot risks early, and act fast—without extra complexity.