Posted by Gynvael Coldwind on May 11
I might be missing something, but how are these considered vulnerabilities?
My point is that these require authentication, and an already authenticated
user already has permissions to reboot the device anyway, right?
If the above assumption is correct, then there isn’t really a security
boundary breach, so it would be a software bug, but not a vulnerability.
Or am I missing something?
– Read More – Full Disclosure