Successful exploitation of these vulnerabilities could allow device reconfiguration, access to project files, decryption of files, and access to passwords.