Step 1: Establish Connection: The attacker initiates an rlogin connection to the vulnerable server.
Step 2: Parameter Injection: The attacker crafts an rlogin command that includes the -froot parameter. This parameter is designed to specify the initial login shell.
Step 3: Authentication Bypass: The vulnerable rlogin implementation, due to a lack of proper input validation, interprets the -froot parameter as a request to log in as the root user.
Step 4: Privilege Escalation: The system grants the attacker root privileges without proper authentication.
Step 5: Root Access Granted: The attacker now has full control over the system.