If properly executed, the exploit would allow an attacker to obtain remote code execution on the target server. In practice, this would mean the attacker has total control over the system and the administrators are in for a very bad day.
Source: SC Magazine