Vulnerabilities
Vulnerable Software
Some access control/intercom products have unauthorized modification of device network configuration vulnerabilities. Attackers can modify device network configuration by sending specific data packets to the vulnerable interface within the same local network.
CVSS Score
4.3
EPSS Score
0.01
Published
2023-06-15


Contact Us

Shodan ® - All rights reserved