...Collection, is a protocol used by many IoT devices to collect and report data. It's a simple protocol, but it's also very vulnerable to exploitation.
Here are a few ways to exploit CMDC:
* **Man-in-the-middle attack:** A man-in-the-middle attack is a type of attack where an attacker...