← Back to context Comment by realitysballs 4 months ago Is this vuln. fixable via firmware or is the vulnerability inherent in the chip architecture? 1 comment realitysballs Reply leptons 4 months ago It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.
leptons 4 months ago It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.
It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.