An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.