SSH keys and log files are accessible through Web interface. Unsfae file permissions. Directory traversal. Privilege escalations, buffer overflows.
vulners.com/securityvulns/securityvulns:doc:9105
vulners.com/securityvulns/securityvulns:doc:9391