...
To take advantage of these vulnerabilities, an attacker must be able to run code on an affected device. While the underlying CPU and/or operating systems may be affected by these vulnerabilities, our SBC device is a closed system that under normal circumstances does not allow customers to run custom code. As a result, if customers are following our recommended deployment procedure (as outlined in IP Firewall Security), they should not be vulnerable to this issue.
...