Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.