An unauthenticated remote attacker could use a demo account of the portal to hijack devices that were created in that account by mistake.
The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides unintended control over that resource.