Virtual assistants handle administrative and logistical tasks for entrepreneurs, small businesses, and busy executives. From ...
An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.