Introduction A few months ago, the team decided to stretch our wings and conduct vulnerability research on embedded devices. Due to budgetary and time constraints, we decided to focus on two devices, a Synology NAS, and a Netgear router. This article will focus on the process of emulating a router, specifically…