"The new exploit, identified as CVE-2024-3094, is a critical vulnerability found in the XZ Utils, specifically in versions 5.6.0 and 5.6.1 of the xz libraries. This vulnerability allows for a backdoor that enables unauthorized remote access to affected systems by bypassing sshd authentication, which could grant a threat actor comprehensive control over the entire system."
It seems unlikely that the Salkstream would be visible from outside the network and have SSH enabled. The Salkstream is designed to work on the LAN, and for most home networks, you would have to change the default firewall on the gateway to allow a device on the LAN to be seen from outside.
I could be wrong. The Salkstream might have SSH turned on by default and some home networks might not have good default firewall rules.