Home Hacking Fluent Bit Flaws Open the Door to Log Hijacking and Cloud Takeover