Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
Abstract: Distributed microgrids are conventionally dependent on communication networks to achieve secondary control objectives. This dependence makes them vulnerable to stealth data integrity attacks ...