The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab