IoT vulnerability PoC Example