Through the exploitation of active user sessions, an attacker could send custom requests to cause a denial-of-service condition on the device.
Through the exploitation of active user sessions, an attacker could send custom requests to cause a denial-of-service condition on the device.