"A security researcher at Juniper Networks has developed a new form of attack that can be used to run unauthorized software on a wide range of computing devices, including routers and mobile phones...
Jack's null pointer exploit is effective on the Arm and xScale processors that are widely used in embedded devices, but it does not work on Intel architecture processors used by PCs."