An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.