No idea why this news is creating such a fuzz.
The main takeaways are these:
Your home WLAN is most likely not affected, because the attacker needs access to the network (authentication).
Assuming you don't share your credentials with random strangers, or - God forbid - running an open network, you're fine. If, for whatever reason, you decide to be the cool dude in the neighborhood and run an open network with a captive portal behind it, good luck securing that in the first place.
If you want maximum security, you will sooner or later end up with prosumer or enterprise hardware that supports WPA3 Enterprise (802.1x) with RADIUS authentication (with some proper EAP method like TTLS). And good luck cracking that anytime soon.
For public (or shared) networks, literally nothing changes. The one in control of the network can do the exact same things as an attacker using AirSnitch. If you want to be on the safe side, use a VPN in these circumstances - as has forever been the recommendation for such threat models.
I honestly don't even know what to say, except that this is another case of fear mongering. The ones who should be worried about this, are sys- and network admins and nobody else.