Research Article

Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces

Figure 3

Exploitation packet for authenticated HTTP response splitting redirection.