Vulnerabilities
Vulnerable Software
 Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.
CVSS Score
5.3
EPSS Score
0.001
Published
2023-10-02


Contact Us

Shodan ® - All rights reserved