According to research CyberMDX, the common element across these vulnerabilities–beyond the devices they affect and their shared point of discovery–is that they all present a direct path to the device’s compromise, whether by way of illicit control, read, write, or upload capabilities.
Read more here.