Zero Day Initiative - Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
Briefly

1. The ZDI identified three different attack methods for exploiting the Sonos One speaker, including a cross-site scripting vulnerability, an authentication bypass vulnerability, and a command injection vulnerability.
2. The vulnerabilities were exploited during the Pwn2Own Toronto hacking competition, showcasing the serious security risks posed by
Read at Zero Day Initiative
[
add
]
[
|
|
]