If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic?
Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.