The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or redirect data, says an expert.