CVE-2025-2820

An authenticated attacker can compromise the availability of the device via the network
Configurations

No configuration.

History

27 Mar 2025, 16:45

Type Values Removed Values Added
Summary
  • (es) Un atacante autenticado puede comprometer la disponibilidad del dispositivo a través de la red.

26 Mar 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-26 15:16

Updated : 2025-03-27 16:45


NVD link : CVE-2025-2820

Mitre link : CVE-2025-2820

CVE.ORG link : CVE-2025-2820


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption