← Back to context Comment by realitysballs 1 month ago Is this vuln. fixable via firmware or is the vulnerability inherent in the chip architecture? 1 comment realitysballs Reply leptons 1 month ago It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.
leptons 1 month ago It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.
It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.