• JohnnyCanuck@lemmy.ca
    link
    fedilink
    English
    arrow-up
    10
    ·
    10 hours ago

    They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.