It depends on how importent security is for that system and how devestating it would be if someone else got control over it and all accounts and devices connected to it.
Assuming there are sucessful exploits it would be like running everything as root and disabling all sandbox/isolation features from the kernel and browsers. I’d say you should not connect such a machine to the internet.