Critical
CVSS: 10.0
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
High
CVSS: 8.6
This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.
Critical
CVSS: 10.0
This vulnerability allows authenticated attackers to execute commands via the hostname of the device.