A. Mac address spoofing
B. Physical theft of data
C. Route spoofing
D. Weak or non-existent authentication
Explanation: Route spoofing is an example of network layer vulnerability. Other examples of network layer vulnerabilities are IP Address Spoofing and Identity & Resource ID Vulnerability.