A vulnerability in Longwatch devices allows unauthenticated HTTP GET requests to execute arbitrary code via an exposed endpoint, due to the absence of code signing and execution controls. Exploitation results in SYSTEM-level privileges.CreditsConcerned OT EngineerReferenceshttps://www.cisa.gov/news-events/ics-advisories/icsa-25-336-01