The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.