An unauthenticated remote attacker can read out sensitive device information through a incorrectly configured FTP service.