A vulnerability was found in the mechanism wpacli and hostapdcli use for executing action scripts. An unsanitized string received from a remote device can be passed to a system() call resulting in arbitrary command execution under the privileges of the wpacli/hostapdcli process (which may be root in common use cases) (CVE-2014-3686).
Using the Mageia wpa_supplicant package, systems are exposed to the vulnerability if operating as a WPS registrar.
The Mageia hostapd package was not vulnerable with the configuration with which it was built, but if a sysadmin had rebuilt it with WPS enabled, it would be vulnerable.