An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.