An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device.Referenceshttps://certvde.com/de/advisories/VDE-2026-020