The security defects could be used to bypass authentication, execute arbitrary commands, and decrypt configuration files.