As kernel privileges allow the application to execute any command on the device, threat actors could potentially use it to steal data or install further malware …

This article was originally published here