An attacker with admin access can install rogue applications. As for the affected products/models/versions, see the reference URL.
An attacker with admin access can install rogue applications. As for the affected products/models/versions, see the reference URL.