An attacker targets a restaurant's network devices, including routers and switches. The attacker gains access to a router after reviewing the device's documentation online. Which of the following describes the most likely attack in this scenario?