Unauthenticated attackers can exploit the vulnerability to execute arbitrary code on affected devices, researchers said