In a nutshell, this vulnerability allows a person to gain unauthorized access to the entire system remotely.
Several Linux-based operating systems and thousands of computers were affected. And there may be even more undiscovered vulnerabilities inserted by this malicious actor.