The vulnerability could allow an unauthenticated attacker to remotely execute administrative commands.