The research highlights the potential for abuse of poorly configured embedded systems