A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system.