Device configuration may be accessed without authentication.
vulners.com/securityvulns/securityvulns:doc:30732