2025-12-24 15:27:06
jci
PUBLISHED
Under certain circumstances a successful exploitation could result in access to the device.