The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.