What file system vulnerability does the following command take advantage of?