Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.
[4.0K] /data/pocs/b24f66777253cd534591e9533519a3bc2dd938e1
└── [ 520] CVE-2018-10933.py
0 directories, 1 file