What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete any system files.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it.