I do not think the BD is the key to finding exploits here, I honestly believe the drive itself has nothing to do with getting an exploit working. Not that it isn't a possible route to take, but I think there are more than one. These checks would be irrelevant on systems without the disc drive...