i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key
i-PRO Configuration Tool provided by i-PRO Co., Ltd. contains a use of hard-coded cryptographic key vulnerability. i-PRO Configuration Tool provided by i-PRO Co., Ltd. contains a use of hard-coded cryptographic key vulnerability.