Last Update: 04/05/2026 at 2:50 PM EST
AirSnitch Breaks Wi-Fi Client Isolation
Coverage from Ars Technica, iPhone in Canada, and others
Articles
4
Latest Article
02/27
Active Days
4
Executive Summary
UC Riverside researchers show AirSnitch can bypass Wi-Fi client isolation on consumer and enterprise routers, enabling traffic interception and tampering
- AirSnitch exploits Layer 1 and Layer 2 behavior to defeat Wi-Fi client isolation
- Attackers can perform bidirectional machine in the middle attacks across SSIDs and AP boundaries
- Researchers demonstrated traffic interception, modification, credential theft, and DNS cache poisoning
- The attack can work on WPA3 networks and against shared group key protections
- Every tested router and vendor showed vulnerability to at least one AirSnitch technique
- Affected devices included consumer and enterprise routers running DD-WRT and OpenWrt
- Mitigations include VPNs, zero trust, stronger segmentation, and end to end encryption
Quick Facts
- What: AirSnitch breaks Wi-Fi client isolation defenses
- Where: Consumer and enterprise Wi-Fi networks
- Why: Weak layer linking lets attackers intercept and modify traffic
- Who: UC Riverside researchers and router vendors
- When: Presented at NDSS Symposium in February 2026

