The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.
The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.