Fairly standard term for a kind of access similar to this, but the distinction is important.
Consider the impact if anybody else, not just this attacker, could have exploited it -- on the other hand, it may have been discovered sooner (had it also not been discovered by accident first).
(https://www.google.com/search?q=%22unauthenticated+remote+co...)