The vulnerability exists in a demo module of NutzBoot for web3j integration. The EthModule.java file contains a method sendTransaction which is exposed as an HTTP endpoint. This endpoint is intended for demonstrating how to send Ethereum transactions. However, it lacks any form of authentication or authorization. The vulnerability report and the source code confirm that by making a simple GET request to /web3j/eth/sendTransaction/{from}/{to}?wei=<amount>, an attacker can cause the server to transfer funds from any of its managed wallets. The from parameter is used to look up a local account, and its stored password is then used to sign the transaction via web3jAdmin.personalSendTransaction. This allows any unauthenticated remote user to drain the wallets controlled by the application.