RCE allows an attacker to run arbitrary code on a remote system without physical access — the most dangerous vulnerability category. Often results from injection flaws, deserialization, or memory corruption.
RCE = CVSS 10.0 in most cases. Log4Shell, EternalBlue, ProxyLogon — famous RCE vulnerabilities. Patch RCE vulnerabilities immediately. Defense: input validation, WAF, network segmentation to limit blast radius.