The affected Raisecom devices allow SSH sessions to be established without completing user authentication. This could allow attackers to gain shell access without valid credentials.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.