Five of them allow remote compromise of the IoT gadgets, so attackers can intercept video feeds and more.
Source: Threadpost