Successful exploitation of this vulnerability may render the device unresponsive. A physical reset of the PLC may be required.
Successful exploitation of this vulnerability may render the device unresponsive. A physical reset of the PLC may be required.