An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via HTTP.