An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.
#STORAGE

Next Generation End-To-End Encrypted Cloud Storage.