The two flaws allow man-in-the-middle attacks that would give an attacker access to all data flowing through the router.
Source link
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Related
Author: Jessica Venkat
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea