A diagram showcasing the network architecture of the attack we wish to exploit an attacker executing code on a Ruijie access point sitting behind a FW/NAT. We decided to focus our research toward ...