Generally, an attacker can use HPP vulnerabilities to:
Supersede existing hardcoded HTTP parameters.
Alter or modify the intended/normal application behavior.
Access and potentially exploit variables that are not been controlled properly.
Bypass WAFs rules or input validation mechanisms.