The application contains a vulnerability that allows attackers to execute arbitrary code on the server.
Complete system compromise. Attackers can steal data, install malware, pivot to other systems, or use the server for malicious purposes.
Identify and patch the vulnerability immediately. Review code for unsafe functions. Implement input validation and output encoding. Use application firewalls. Apply principle of least privilege.