what I found interesting is that during the boot sequence the I/O input of the switch actually made calls to the DWORD access tree of the bootstrap, which gave an overflow of a few bytes of memory into the ROM kernel mode of the initiation process into the memory, which resulted in an overflow, while not exactly a buffer overflow, this entire process seems suspicious, in other words Nintendo gave the switch an extra layer of security, but many times an extra layer of protection proves to be cumbersome, it actually defeats the purpose and makes a device more vulnerable, in this case it showed up on the initiation, I've looked into 3.0.0 up to 4.1.0, the process is the same, which meant Nintendo has overlooked this important little process, I bet in the case of a power surge and in the unlikely event that a bit more detail is revealed, Nintendo would obviously smell blood and patch this exploit as soon as possible.