The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or redirect data, says an expert.
The deployment of a traditional wide area network (WAN) is rooted in a vertically-integrated topology, where devices like routers and switches are proprietary hardware appliances with bundled software ...