An unauthenticated remote attacker may use a missing authentication for critical function vulnerability to reboot or erase the affected devices resulting in data loss and/or a DoS.CreditsFelix Eberstaller and David Schauer from Limes SecurityReferenceshttps://www.schneider-elektronik.de/wp-content/uploads/2024/07/SAR-202405-1.pdf