A low privileged local attacker can leverage insecure...
High severity
Unreviewed
Published
Jul 8, 2025
to the GitHub Advisory Database
•
Updated Jul 8, 2025
Description
Published by the National Vulnerability Database
Jul 8, 2025
Published to the GitHub Advisory Database
Jul 8, 2025
Last updated
Jul 8, 2025
A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
References