OS command injections occur when applications build command lines from untrusted data before executing them with a system shell. + In that case, an attacker can tamper with the command line construction and force the execution of unexpected commands. This can lead to the compromise of the underlying operating system.