The Ruby vulnerability is not easy to exploit, but allows an attacker to read sensitive data, start code, and install ...
The design example shows OTA firmware update performed on a microcontroller using the "staging + copy" method.