Vulnerability Description: This vulnerability occurs when any open source or commercial software is newly installed on the server, the default credentials are not changed. These default credentials are guessable or publicly available in the software documentation or any public forum. This Default credentials can be lead to gain admin-level privileges on the application.