The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device.
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.pdf
https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.json
https://www.first.org/cvss/calculator/3.1
https://www.cisa.gov/resources-tools/resources/ics-recommended-practices
https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF