Hundreds of millions of users and an estimated 2.5 billion devices are reportedly exposed to potential attacks.
Once a victim is exposed to a malicious link, the exploit gains filesystem access and exfiltrates data to an attacker-controlled server.