This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.
This vulnerability allows authenticated attackers to execute commands via the hostname of the device.