cayin technology Exploited Vulnerabilities