This document summarizes the reverse engineering process undertaken by JSOF researchers to analyze the Treck TCP/IP stack present in multiple devices and firmware versions. They reverse engineered 7 different binaries from devices like a Freescale demo, Windows demo, Digi development board, Intel AMT, HP printer, APC UPS, and GE MDS. This involved dealing with different processor architectures, file formats, and versions of the Treck library. Their work uncovered vulnerabilities in several devices and inconsistencies in how vendors had patched issues.