Hello! The vulnerability is based on API flaws and social engineering. The client forms an active request to the support service with a link (more often the tamer of links). Which contains the link:
After that, the employee who has superuser rights grants the admin12345 account the superuser rights with the following SQL query: insert into user (id,name,account,password,realname,email,lang,superuser,disabled,support,remotesupport,changepasswd,sendsms) values (23351,'admin12345',1,'$1$FALDvy2D$fqFzhtlSZrq1pDQ3fkrpr/','test test','test@test.test','ru','1','0','0','0','2012-01-29','0');
As a temporary solution, give only one account the rights of the superuser, for the rest, disable this feature.