Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices. Security researchers have found a critical remote code ...