Due to the diversity of the ways and scenarios of third-party software/components integrated in our product, we will adjust the vulnerabilities of third-party software/components according to the specific scenarios of our product in order to reflect the real effect of the vulnerabilities. For example, if the module which is affected by a vulnerability in a third-party software/component is not called by us, we consider the vulnerability "cannot be used, and is not affected".
For the possible vulnerabilities in the sample type code, we believe that it will not pose a security risk to the mass-produced product. If you need to integrate the sample code into your product, you need to take the responsibility of assessing and fixing the vulnerabilities on your own.