A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.