Hackers can exploit them to gain full administrative control of internal devices.