Given the long and gory history of companies releasing insecure by default devices methods like this are a legitimate entry point into a network.
Given the long and gory history of companies releasing insecure by default devices methods like this are a legitimate entry point into a network.