Known Vulnerabilities in R8000 page 2