Detailed by researchers at Forescout, the Name:Wreck vulnerabilities could allow attackers to control devices and remotely execute code, act as a gateway to the rest of the network, or even take IoT devices offline.