An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).