Vulnerabilities allow unauthenticated remote attackers to access sensitive device information and launch denial of service attacks.
Source: Threadpost