This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Application Information Optimizer. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the ability to access configuration pages without authentication. The issue lies in a failure to remove files after the initial configuration has occurred. An attacker can leverage this vulnerability to execute code under the context of the user running the service.