CVE-2025-43873
Successful exploitation of these vulnerabilities could allow an attacker to modify firmware and gain full access to the device.
More information : https://www.cisa.gov/news-events/ics-advisories/icsa-25-345-02
Successful exploitation of these vulnerabilities could allow an attacker to modify firmware and gain full access to the device.
More information : https://www.cisa.gov/news-events/ics-advisories/icsa-25-345-02