Vulnerabilities in Weston Embedded software