FortiOS Authentication Bypass Vulnerability Lets Attackers Take Full Control of Device
https://cybersecuritynews.com/fortios-authentication-bypass-vulnerability/
#Infosec #Security #Cybersecurity #CeptBiro #FortiOS #AuthenticationBypass #Vulnerability #FullControlOfDevice