Not possible: Cisco Meraki MX68W, unless You have heaps of time and skill to search for vulnerabilities in the chain of trust implemented on that device.
Not possible: Cisco Meraki MX68W, unless You have heaps of time and skill to search for vulnerabilities in the chain of trust implemented on that device.