Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.
This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.