"The vulnerability is remotely exploitable and may grant the attacker administrator-level privileges on the target machine/device."