This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dr��ger X-dock. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the display. The firmware and filesystem contain hard-coded default credentials. An attacker can leverage this vulnerability to execute code in the context of root.