An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code injection as root. This results in a total loss of confidentiality, availability and integrity due to improper control of code generation ('Code Injection’).
Credits
D. Blagojevic, S. Dietz, F. Koroknai, T. Weber from CyberDanube