The hacker leveraged a software vulnerability to access administrative functions and information from a database.