Now that you have access to the UART interface of your target device, you can also perform additional exploitation techniques such as backdooring and dumping the entire file system over trivial file transfer protocol (TFTP). This, however, would vary from device to device and would be dependent on the current privileges you have on the device that you have compromised.