Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials. CreditsAlan Cao reported these vulnerabilities to CISA.Referenceshttps://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11https://birddog.tv/downloads/