The host is installed with Dell Command Update before 4.2.1 and is prone to a link following vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could leads to creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.