As a result, the two flaws could be chained to execute arbitrary code on a vulnerable device without authentication ...