The flaw could allow a remote, unauthenticated attacker to bypass authentication on vulnerable devices.
Source: Threadpost