Under certain circumstances a successful exploitation could result in access to the device.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
2 reference(s) from NVD