Identifying and Mitigating Exploitation of the GRE Decapsulation Vulnerability