Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.
                    
                    
                        Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.