Hmmm.... This is very bad.
The above exploit is nasty and in active use. There's a certain irony here - The device I intend to use to protect my network against the exploitation of such vulnerabilities requires me to specifically open up an additiona...