An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.