An attacker with network access, could capture traffic and obtain user cookies, allowing the attacker to steal the active user session and make changes to the device via web, depending on the privileges obtained by the user.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.