The vulnerability stems from a flaw in how NIS+ handled the wildcard user entry ('+') in its authentication process. Specifically, the NIS+ daemon, when configured with certain settings, failed to properly validate the user's identity when the wildcard entry was present. This allowed an attacker to bypass authentication checks and gain access with the privileges associated with the wildcard user, which, in many configurations, defaulted to root. The root cause is a logic error in the authentication code, likely related to how the '+' entry was prioritized or handled during the login sequence. This is not a buffer overflow or race condition but a logic flaw in the authentication flow.