logoalt Hacker News

crotetoday at 3:41 AM0 repliesview on HN

That's only proof of the vulnerability. Where's the proof of it being misused by the vendor?