An unauthenticated attacker can hijack other users' devices and potentially control them.
Related posts