In low end platforms that can be achieved by exploiting known software weaknesses (such as the well known "Buffer Overflow" exposure). For more robust platforms, that would imply in a first pass to get the undue privileges, as mentioned above, in order to be able to modify the system's ...
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR * TORT (INCLU...
at least for some of the cards we've tried. * The realtime-clock commands were not properly setting the clock to "military time" mode, affecting the notion of AM and PM. * The real-time-clock code has been divided intotwo pieces, the user-interface and a standard CFE driver. This...