An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
The product does not correctly convert an object, resource, or structure from one type to a different type.