In a past life as a managed hosting provider ffmpeg exploits were used to gain access to systems.
It’s used for pretty much any platform you can upload video to. Some places far more competently than others.
See, I’d be interested in any actual evidence/writeups of that in the wild.
See, I’d be interested in any actual evidence/writeups of that in the wild.