Exploits allow hackers to bypass 2FA and commandeer vulnerable devices.