Thank you.
I suspected there would be logistical issues for patching and expected it to be non-trivial on an older embedded-esk system (especially after reading the recent post about changes to licensing/updates) and haven't dug too deep into the Metrobridge stack. I'm also aware of the minimal risk in most use cases but I had to ask.
I'm responsible for some of the underlying infrastructure and deployment for a small (yet growing and unknown end scale) state wide mesonet of weather stations across my region and currently use Metrobridge devices at each station to ferry data back to a central MySQL database. The majority of the nodes are in rural locations in areas that are typically not surrounded (within WiFi range) by technical users, so the current risk is very minimal, however, with multiple nodes, risk grows. The station locations have detailed spatial information from high accuracy GPS for scientific use, but such information could be used against us in this particular case (for more conveniently localized WPA2 attacks, we even have a map

).
The main risk right now is that some nodes are in fairly densely populated areas that are much higher risk (on two university campuses, soon three, where people are known to explore -- one is right beside our CS department heh) and these are the nodes at the most risk (likely from CS students interested in IoT/cybersecurity). As you mentioned, I expected patching WPA2 will require flashing or some physical time with the devices (which requires me driving hours and hours through rural regions to each node location which as you mentioned, is not something enjoyable for me) which is another reason I was interested so I can try plan out the future network deployment schedule (minimize driving to sites multiple times by applying patched firmware to future nodes).
I've taken obvious precautions to create a minimally privileged a database user for Meteobridge I/O to minimize risk of having our database compromised (amongst other precautions), or worse, escalated shell access from the database account (due to design choices by other parties on a software platform, I'm stuck with an older version of MySQL that likely looks like a Swiss cheese of vulnerabilities).
Ultimately, the direct MySQL client database connections from Meteobridge are expected to be replaced by calls to a REST interface/API to add another layer of encapsulation, but given strained personnel resources on time of my associated project, this may or may not ever happen.
Anywho, it's my job to ask this question, otherwise on the odd (and unlikely) chance someone targets our network and our mesonet's dataset integrity is compromised, my boss will ask if I was aware if the issue and looked into it or not. I can now say "yes."
