Identifying and Mitigating Exploitation of Multiple Vulnerabilities in Cisco Wireless LAN Controllers