Identifying and Mitigating Exploitation of the SQL Injection Vulnerability in Cisco Wireless Control System