Posted by Gynvael Coldwind on May 11

Hi,

I might be missing something, but how are these considered vulnerabilities?
My point is that these require authentication, and an already authenticated
user already has permissions to reboot the device anyway, right?

If the above assumption is correct, then there isn’t really a security
boundary breach, so it would be a software bug, but not a vulnerability.
Or am I missing something?

Thanks,
Gynvael
Read More – Full Disclosure


By |2021-05-11T16:19:14-04:00May 11th, 2021|