An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.