16/07/2024
If exploited, this vulnerability can lead to the complete compromise of a system by allowing an attacker to execute arbitrary privileged code, thereby being able to install malware, alter or delete data and create persistent access to the system. It can also facilitate access to the rest of the network by establishing a compromised system within it.