If you have a strong dislike for advertisements intruding on your internet experience and you like to tinker and DIY your home network, then you might likely have deployed a Pi-hole in your environment. This vulnerability does require access to the Pi-hole webui and admin credentials, but it allows for arbitrary command execution. Pi-hole versions 4.3.2 and earlier are affected.
Full writeup here!