Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
Abstract: Emerging flexible resources have been integrated into automatic generation control (AGC) systems to mitigate the increasingly severe power disturbances caused by the growing penetration of ...