The flaw can be exploited to push root code execution through MiTM attacks.

Leave a Reply