These days, Im skeptical of statements like this
Generally, these vulnerabilities can be exploited to take full control of a target device (RCE)
Who's still out there making operating systems where the network layer processes are given root-level access? WHO? Cause they should be shot whoever they are.