An attacker may modify the URL to discover sensitive information about the target network.CreditsJon Hurtado of Sandia National Laboratory reported these vulnerabilities to CISA.Referenceshttps://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17https://old.outbackpower.com/about-outback/contact/contact-us