Step 1: input the affected device and affected model
Step 2: select the vulnerability type
Step 3: put the PoC into "Input PoC"
Step 4: click "start analysis"
The PoC validation result and related vulnerability result are shown in the "Analysis Result" section
NOTE: We provided some POC examples that can be used for the toolkit on the next page