An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.
The product does not properly verify that the source of data or communication is valid.