<s>
A	O
Default	B-Protocol
Credential	I-Protocol
vulnerability	I-Protocol
is	O
a	O
type	O
of	O
vulnerability	O
in	O
a	O
computing	O
device	O
that	O
most	O
commonly	O
affects	O
devices	O
having	O
some	O
pre-set	O
(	O
default	O
)	O
administrative	O
credentials	O
to	O
access	O
all	O
configuration	O
settings	O
.	O
</s>
<s>
In	O
the	O
real	O
world	O
,	O
many	O
forms	O
of	O
malware	O
,	O
such	O
as	O
Mirai	B-Language
,	O
have	O
used	O
this	O
vulnerability	O
.	O
</s>
<s>
Once	O
devices	O
have	O
been	O
compromised	O
by	O
exploiting	O
the	O
Default	B-Protocol
Credential	I-Protocol
vulnerability	I-Protocol
,	O
they	O
can	O
themselves	O
be	O
used	O
for	O
various	O
harmful	O
purposes	O
,	O
such	O
as	O
carrying	O
out	O
Distributed	O
Denial	O
of	O
Service	O
(	O
DDoS	O
)	O
attacks	O
.	O
</s>
