Submitter : c2a
Date: 12 July 2024
Bounty : undisclosed
Vulnerabilities :
- VoIP Hacking
- Hardware Hacking
- Reverse Engineering
- Arbitrary File Read
- TOCTOU
- Local Privilege Escalation
Programs :
Authors :
Link : https://blog.syss.com/posts/voip-deskphone-firmware-security/