Unauthenticated cyberattackers can also wreak havoc on networking device configurations.
Threatpost