Internet-connected device vulnerabilities