ABSTRACT

In late 2015, a security researcher discovered multiple vulnerabilities in various name-brand wireless routers. Discovered Šaws included path traversals, used to access potentially sensitive application programming interface (APIs), and weaknesses that allow unauthenticated attackers to alter the setting of a device, bypass authentication, and remote code executions.1 In another scenario, Google′s Android OS was found to be prone to numerous vulnerabilities which could be exploited through e-mail, web browsing, and MMS when processing media les.