If you find a command execution vulnerability, check out this post and you can use one of the reverse shell scripts to open a shell to exploit the system: http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet