The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.
https://www.cisa.gov/news-events/ics-advisories/icsa-26-050-04
https://www.welker.com/contact-us/welker-team
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-050-04.json