An authenticated attacker can compromise the availability of the device via the network
References
Configurations
No configuration.
History
27 Mar 2025, 16:45
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Mar 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-26 15:16
Updated : 2025-03-27 16:45
NVD link : CVE-2025-2820
Mitre link : CVE-2025-2820
CVE.ORG link : CVE-2025-2820
JSON object : View
Products Affected
No product.
CWE
CWE-400
Uncontrolled Resource Consumption