Mitsubishi Wifi Module WF-RAC (Smart M-Air)

I just wanted to make every one aware, it would appear that there is an issue with these WF-RAC modules whereby they are performing an ARP spoofing attack on my network.

This was confirmed just now with support from my router manufacturer, TP-Link. 10.1 is my router and the A0:43 mac addresses are the WF-RAC adapters.

arp: 192.168.10.1 moved from 9c:a2:f4:57:6d:5e to a0:43:b0:5a:cb:82 on igb0
arp: 192.168.10.1 moved from 9c:a2:f4:57:6d:5e to a0:43:b0:5a:cc:48 on igb0
arp: 192.168.10.1 moved from 9c:a2:f4:57:6d:5e to a0:43:b0:5a:d7:85 on igb0

This is happening every hour for about 10 seconds for each WF-RAC unit.

Please check your networks for any suspicious activity.