A Systematic Approach to Prioritize Vulnerabilities in IoT Deployments