Remote attacker can execute code by simply sending a UDP packet to a Linux machine. More from The Lunduke Journal: https://lunduke.com/