Due to improper input validation, a remote attacker could execute arbitrary commands on the target system.