Eg. I’m specifically thinking of this: How can the adversary construct unencrypted Wi-Fi frames so they are accepted by a vulnerable device? First, certain Wi-Fi devices accept any unencrypted frame even when connected to a protected Wi-Fi network. This means the attacker doesn’t have to do anything special! Two of out of four tested home routers were affected by this vulnerability, several internet-of-things devices were affected, and some smartphones were affected.
Since opensprinkler accepts http commands in plain, it could be possible to send unencrypted wifi frames to the unit, which could be misinterpreted.
Afaik Espressif released an update to ESP-IDF which includes patches for the FragAttacks CVEs. See their Security Advisory.
The fixes have been added to ESP-IDF versions: