Originally Posted by ocabj
WPA was broken in 2009 using a method of short packet spoofing. It targeted a weakness in TKIP which is the underlying algorithm for WPA.
This is why no one uses (or should be using) WPA.
Yes, someone shrewd enough and wanting in sniffing WPA running TKIP has an entry point, which is why WPA2 was fast tracked in implementing CCMP-AES crypto.
Also for the OP along side a very hardened PSK (password) if you are presumably using this, if your device supports WPS PINs you need to disable that, even if the device is supporting WPA2.