Successful exploits will allow attackers to execute arbitrary code in the context of the affected application.The researchers who found this issue have created a functional exploit for demonstration. The exploit is not publicly available.
Vendor Status:
Currently we are not aware of any updates from the vendor.