By infiltrating a device manufactured by a big IoT OEM, we gained full control of thousands of devices across the globe. By exploiting vulnerabilities that we discovered, we were able to not only control the device, but also to use it as a pivot for infiltrating corporate networks.