The vulnerability can be used to trigger DoS attacks and crash devices. …read more
Source:: techradar.com – Gadgets