Remote attackers can easily compromise the device and pivot to move laterally through the LAN or WAN.
Source: Threadpost