Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more. …read more

Source:: Threatpost