Skip Navigation

Posts
0
Comments
43
Joined
1 yr. ago

  • Authentication bypass should give you interactive access. "I'm in" like. Remote code execution only allows you to run a command, without permanent access. You can use some RCE vulnerabilities to bypass authentication, but not all.

  • I'm just pointing a factual error, not trying to engage in a complex debate. IP rights and business practices are a complex topic and I can't care enough to really engage here.

  • Outdated info. Nowadays foreign automakers can operate in China without a joint venture.