The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.
                    
                    
                        The vulnerability allows a remote attacker to authenticate to the SSH service with root privileges through a hidden hard-coded account.