How Embedded TCP/IP Stacks Breed Critical Vulnerabilities
In the past few years, there’s been a rise in critical vulnerabilities affecting embedded TCP/IP stacks which had remained undiscovered for over a decade.
by Black Hat
simple network management protocol