I'm essentially skeptical that if you have the ability to control the linux root filesystem for a very old linux distro that any other security measures for the linux binaries themselves matter.
The secure firmware can be updated, but it is signed as well.
I wonder if they offer their customers source to keep the Busybox folks happy?
Now I am curious if I can find a terminal myself, if they are actually getting phased out it might not be too difficult to find a used one...
Any real testing happening in the tamper state might be meaningless. Perhaps the shell is available after the tamper state triggers for resetting purposes.
It just seems like opening it would be the last thing you would try.
No, I got a shell on second, untampered one, as well.
Also, I think Linux always loads loadercode + mp1.img, regardless of the tamper state. The different code paths depending on tamper state are taken within the (integrity protected) loadercode.
I guess Atos Worldline really doesn't like root passwords.