Timelink products are protected against those vulnerabilities by the fact that in order to exploit the vulnerability, malware is required to be run locally within the system.
When using a Timelink product, only authorized users with the appropriate password can successfully authenticate and access a command line shell which would allow to run a malware.
Timelink recommends following good security practice in terms of policies that protect and limit access to trusted users.
Timelink is following closely the security aspects of its products and is committed to improving it.