May 22, 2023, 10:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.

access credentials cve files firmware hard hard-coded credentials images root unauthorized access

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Brand Experience and Development Associate (Libby's Pumpkin)

@ Nestlé | Arlington, VA, US, 22209

Cybersecurity Analyst

@ L&T Technology Services | Milpitas, CA, US

Information Security Analyst

@ Fortinet | Burnaby, BC, Canada