Vulnerability allowed an unauthenticated remote attacker to log in to a device at the time the system initially boots up.
Source: Threadpost