Watch this video on YouTube
To execute an unauthorized command injection on an ICS device via its web interface, which HTTP method is most commonly exploited?