An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.CreditsDeutsche Telekom Security (DT Security)Referenceshttps://certvde.com/en/advisories/VDE-2025-079/https://certvde.com/en/advisories/VDE-2025-096/https://janitza.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-079.jsonhttps://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-096.json