Vulnerabilities in bluetooth stack may allow an attacker to execute code and gain access to the system.