An issue was discovered in EyesOfNetwork 5.3. The installation uses the same API key (hardcoded as EONAPI_KEY in include/api_functions.php for API version 2.4.2) by default for all installations, hence allowing an attacker to calculate/guess the admin access token.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-8657