Vulnerability allowed an unauthenticated remote attacker to log in to a device at the time the system initially boots up. …read more

Source:: Threatpost