The flaw makes phones vulnerable to man-in-the-middle attacks, allowing arbitrary commands as a privileged user.
Virtueller Kaffee und Themen rund um IT, Ops, Dev, Homelabs und Wolken…
The flaw makes phones vulnerable to man-in-the-middle attacks, allowing arbitrary commands as a privileged user.