After successful exploitation an agent will be installed. This agent will inherit the user identity and capabilities of the abused service, usually the super user, but in some configurations it might be that of any other user in the target system.
CVE Link
Exploit Platform
Product Name