Configuration changes are applied without authentication through Web interface.
vulners.com/securityvulns/securityvulns:doc:13753
vulners.com/securityvulns/securityvulns:doc:19486