An unauthorized remote attacker can bypass the...
Critical severity
Unreviewed
Published
Jun 6, 2025
to the GitHub Advisory Database
•
Updated Jun 6, 2025
Description
Published by the National Vulnerability Database
Jun 6, 2025
Published to the GitHub Advisory Database
Jun 6, 2025
Last updated
Jun 6, 2025
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
References