What are common vulnerabilities in IoT systems