Apologies if this has already been posted somewhere (searched and couldn't find anything), but stumbled across this and had to share.
Allegedly it's possible to make use of a 7-second window of unsecured WiFi access during the SuperHub boot process to gain access to the admin panel and retrieve the unmasked WiFi password.
It requires the admin panel password, but as we all know it's very rare for the general user to do change that
Read more (and learn how to protect against it) here:
http://ramblingrant.co.uk/2014/03/06...security-flaw/