After successful exploitation an agent will be deployed. This agent will inherit the user identity and capabilities of the abused service, usually root. CVE Link CVE-2007-2881 Exploit Platform Linux Exploit Type Exploits Remote Product Name Impact