One of the techniques that often come in useful during exploitation is the ability to modify firmware. This can be done by extracting the filesystem from the firmware, modifying the contents, and then repackaging it into new firmware. This new firmware could then be flashed to the device.