An unauthenticated remote attacker can read out sensitive device information through a incorrectly configured FTP service.
7.5CVSS
7.4AI Score
0.001EPSS
An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.
9.8CVSS
9.6AI Score
0.001EPSS