This depends pretty heavily on your threat model. You're right that a device like this is exceedingly unlikely to get exploited by attackers casting a wide net against common vulnerabilities. But an attacker targeting you-in-particular would love to learn you've put ancient hardware and/or software on the network.