This vulnerability allows authenticated attackers to execute commands via the hostname of the device.