Remote attackers can execute arbitrary code in the context of the vulnerable service process.
This vulnerability allows an unauthenticated attacker to achieve remote command execution on the affected PAM system by uploading a specially crafted PAM upgrade file.