It could be a good idea to Possess a number of terminal periods open while you're making changes. This will allow you to revert the configuration if important without the need of locking you out. Effective exploitation of this vulnerability could let for distant code execution from the context https://createssh.org/