This Metasploit module exploits a weak access control check in the BMC Server Automation RSCD agent that allows arbitrary operating system commands to be executed without authentication. Note: Under Windows, non-powershell commands may need to be prefixed with 'cmd /c'.
020bc853633a23b3189378857da4cf64c9fbfa92972a9d8257b10605b54490ec