Lack of input sanitization in the Linux based Barracuda spam firewall web interface allows execution of commands by unauthenticated users. Combined with privilege elevation techniques, execution of commands as the root user is possible allowing a full system compromise.