Andreas Hernandez
Level 1
Level 1
Member since ‎05-09-2012
‎08-24-2022

User Statistics

  • 5 Posts
  • 1 Solutions
  • 0 Helpful votes Given
  • 0 Helpful votes Received
Recent Badges
1 Accepted Solution
Certifications

User Activity

An attacker who can connect to an affected device could exploit this vulnerability. I'm missing the information about how this bug can be exploited. Can this be exploited trough admin gui? ssh access? captive portal login? capwap tunnel to WLC?
Community Statistics
Member Since ‎05-09-2012 08:15 AM
Date Last Visited ‎08-24-2022 12:01 AM
Posts 5