An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.

Exploit Database

Exploits for Penetration Testers, Researchers and Ethical Hackers.