1. The ZDI identified three different attack methods for exploiting the Sonos One speaker, including a cross-site scripting vulnerability, an authentication bypass vulnerability, and a command injection vulnerability.
2. The vulnerabilities were exploited during the Pwn2Own Toronto hacking competition, showcasing the serious security risks posed by
2. The vulnerabilities were exploited during the Pwn2Own Toronto hacking competition, showcasing the serious security risks posed by
[
add
]
[
|
|
...
]