The vulnerability stems from a buffer overflow in the Livingston RADIUS code. Specifically, the code likely fails to properly validate the size of data received from a network request, such as an authentication request. When a specially crafted packet containing an overly long string is sent to the RADIUS server, the data overflows a fixed-size buffer allocated in memory. This overwrites adjacent memory locations, potentially including critical program data like function pointers or control structures. By carefully crafting the malicious input, an attacker can overwrite these memory locations with their own code, leading to arbitrary code execution with the privileges of the RADIUS server, which is often root.