Operating systems like RTEMS provide API to interact with. An attacker can exploit them or abuse a vulnerability/misconfiguration to maliciously execute code or commands. [1]
Standard/references: [2]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.