Cool research and nicely written summary: "At this point in time, an attacker can easily cause a denial of service using this exploit, but as SonicWall noted in its advisories, a potential for remote code execution exists. While it may be possible to devise an exploit that can execute arbitrary commands, additional research is needed to overcome several challenges, including PIE, ASLR, and stack canaries. Perhaps a bigger challenge for an attacker is determining in advance what firmware and hardware versions a particular target is using, as the exploit must be tailored to these parameters. Since no technique is currently known for remotely fingerprinting SonicWall firewalls, the likelihood of attackers leveraging RCE is, in our estimation, still low. Regardless, taking the appropriate precautions to secure your devices will ensure they don’t fall victim to a potentially painful DoS attack" - I think one aspect you must include when triaging these vulnerabilities is the difficult and impact of the firmware upgrade. While difficult to determine ahead of actually installing the update, if its easy and low operational risk, just apply the patch. Don't get hung up on the exploitability, as that could change at any time and I'd rather you be patched than scrambling to update all of your appliances. Also, some Linux distributions do a great job of collecting and posting user feedback on how well, or not so well, the update went for you. This crowdsourcing of the update experience is amazing, and I wish more vendors did this (unless they do and I just don't check the support forums).