The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code