Log4j in Your Embedded Products? Find It Before Attackers Do