The issues identified permit unauthorized access to the TV’s root system by bypassing authorization mechanisms
This article has been indexed from www.infosecurity-magazine.com
The issues identified permit unauthorized access to the TV’s root system by bypassing authorization mechanisms