1. Neshenko
N.
Bou-Harb
E.
Crichigno
J.
Kaddoum
G.
& Ghani
N. (2019). A Survey on IoT Security: Challenges
Approaches
and New Trends. IEEE Access
7
14307-14326. DOI: https://doi.org/10.1109/ACCESS.2019.2915748.
In Section IV-A
"Physical Layer Attacks
" the paper states: "Attackers can also get a root shell on the device through the UART interface. With root access
attackers can do anything they want
such as installing malicious software or stealing sensitive information." This directly links unprotected shell access via physical ports to the risk of malware installation.
2. OWASP Foundation. (2018). OWASP Internet of Things Top 10 - 2018. OWASP.
Reference vulnerability "I8:2018-Insecure Default Settings" discusses how devices may ship with insecure settings
such as open debugging ports that provide shell access. The document notes that the impact of exploitation is "a full compromise of the device
" which is typically achieved by installing malicious code to maintain control and carry out further attacks.