I don't think so @BHC_RESORTS
The vulnerability requires you to execute code. The vulnerability exploits an issue with the CPU speculatively running code, and allows memory to be read from another protected execution environment.
So a stray packet would have to some how cause code to be executed, somehow cause the speculative scheduler to abort, read the memory from another protected process from the CPU cache, and then somehow put it back into another packet and send it out.
It's not like running code on a PC or phone where there is a way to actually get code onto the device, run the code, retrieve the memory contents of another process, and then do something with it.
It's not going to happen. It would say there is a greater probability I will die tomorrow.