This vulnerability exists in WMT Playout Server’s Web Administrative Interface on Version 20.2.8 and Below, due to the presence of a default account that has a default password “pokon”. An attacker exploits this vulnerability by connecting an affected system using this default account. A successful exploit will help the attacker to gain read and write access to system data, including the configuration of affected devices.
An attacker will be able to obtain access to sensitive portions of the system and have administrative privileges to control the device.
We recommend you to upgrade WMT Playout server to latest version.