We continue to analyze vulnerabilities of industrial switches: we execute arbitrary code without a password