An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
The product does not correctly convert an object, resource, or structure from one type to a different type.