Attackers could use a recently-revealed flaw to disable their target’s device and destroy their data.