An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.
                    
                    
                        An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.