Successful exploitation of this vulnerability could cause the device to reboot and change its state, causing the device to become unavailable.

Share This