Embedded systems
On the whole if an attacker can run their own code on an embedded system it's game over anyway. This should require high level permissions that allow all kinds of other entertainment to happen.
If it doesn't while I don't want to make light of these issues there are other, more urgent, ones that need working on.