This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.