CVE-2025-2820

An authenticated attacker can compromise the availability of the device via the network
Configurations

No configuration.

History

No history.

Information

Published : 2025-03-26 15:16

Updated : 2025-03-27 16:45


NVD link : CVE-2025-2820

Mitre link : CVE-2025-2820

CVE.ORG link : CVE-2025-2820


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption