Years ago, implementing a PEDICOM exploit proof-of-concept by hand was the kind of task that quietly ate an entire day, and a week to actually fix it. Not because the[…]