An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
The first port of call is to choose a mini PC. Not all of them will make for a good router and firewall. For instance, we ...