← Back to context Comment by realitysballs 6 months ago Is this vuln. fixable via firmware or is the vulnerability inherent in the chip architecture? 1 comment realitysballs Reply leptons 6 months ago It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.
leptons 6 months ago It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.
It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.