With access to the file explorer or a dialog box it is possible to communicate over protocols that may not be anticipated.
The file explorer has a built in ability to understand protocols other than the file:// protocol it normally uses. Commands such as fti://<IP> can be understood and can be used to attempt to connect to an FTP server
Should access be possible, the file explorer will show that we have established an outbound connection to an internet device in the address bar
From here it is possible to potentially upload or download files and use this as either a method of exfiltration or a method to deploy tools onto a potentially locked down device