Regarding the vulnerability of i(Pad)OS, this statement was added 8 months ago.
Mullvad pointed out that this is an issue with no solution, but also mentioned a few issues that have solutions, such as enabling airplane mode or disabling cellular data.
Vulnerabilities
The following potential privacy issues exist in Apple’s iOS and iPadOS.
Traffic to Apple services can bypass the VPN tunnel. This includes iCloud, Maps, Siri and notifications.
Solution: None. Apple does not make it possible to send this traffic through a VPN.Connections that were established before you connected to Mullvad can bypass the VPN tunnel.
Solution: Connect to Mullvad, enable Airplane mode, turn off Wi-Fi if it’s on, then disable Airplane Mode.Apps on the device can be designed to bypass the VPN tunnel by routing traffic over cellular/mobile data.
Solution: Disable cellular/mobile data when you use Wi-Fi.A malicious Wi-Fi network can instruct the device to send Internet traffic outside of the VPN tunnel. This is known as the TunnelCrack LocalNet attack.
Solution: None.
Linux seems to have vulnerability that is less known than others. So, it might be better to talk about vulnerabilities in other operating systems. Also, there’s already a network namespace solution for the WireGuard protocol and Linux, and it’s shared on the official site.