Critical remote management tool vulnerability allowing unauthorized administrative access. Impact: Complete system takeover, lateral movement, infrastructure compromise. Remediation: Implement proper authentication, access controls, and audit logging for administrative endpoints.