The flaws would allow threat actors to run arbitrary code remotely. …read more
Source:: techradar.com – Gadgets