As part of a graduate reverse engineering course at Iowa State University, my group was tasked with auditing the security of TP-Link's mesh wireless offering, the Deco M5. One of the chosen avenues was to attempt gaining root shell access by interfacing with an exposed debug interface on the device …