What is remote access vulnerability?

What is remote access vulnerability?