Linked Presentation: One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers