Three security vulnerabilities can be chained to enable unauthenticated remote code execution.
Source: Threadpost