Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It isn't really a vulnerability. You have to already have full access to the device to use the undocumented commands reported in the article.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: