Quick question, does the Tablo use the BASH shell at all? Is there any risk via this vulnerability? I don’t expose much of my home network to the internet but the Tablo is one of the devices.
Quick question, does the Tablo use the BASH shell at all? Is there any risk via this vulnerability? I don’t expose much of my home network to the internet but the Tablo is one of the devices.