Embedded devices are present in pretty much anything and everything we use, ranging from kiosks, celphones, card-readers, cars, sensitive infrastructure, energy plants, houses, etc. Hacking and security vulnerabilities do not only affect software. There are plenty of embedded sytems and hardware that could possible be vulnerable to even more sensitive vulnerabilities that a web application might have.