The affected product is vulnerable to an attacker being able to use commands without providing a password which may allow an attacker to leak information.