Which of the following is an exploit against a device where only the hardware model and manufacturer are known?