Full title: SolarWind LEM Default SSH Password Remote Code Execution Exploit Category: remote exploits Platform: windows This module exploits the default credentials of SolarWind LEM. A menu system is encountered when the SSH service is accessed with the default username and password which is "cmc" and "password". By exploiting a vulnerability that exist on the menuing script, an attacker can escape from restricted shell. This module was tested against SolarWinds LEM v6.3.1. # 0day.today @ http://0day.today/