An unauthenticated remote attacker can manipulate the device via Telnet, stop processes, read, delete and change data.