An authenticated attacker can compromise the availability of the device via the network
Update to the current Version of the device firmware
* Prevent access for unauthorized Persons for FTP and SFTP * Disable FTP and SFTP