I have just read your updated post. Decrypting FIRM with the right key seems appealing but you need to remember that for the sake of the exploit, a specific version of FIRM1 is used (not to mention a new FIRM with a fixed Kernel9 Loader could be released someday, in which case we couldn't update it to the latest version, not to mention it's a bad idea to keep updating the FIRM partition in the first place as if anything goes wrong, you can't recover (you broke the a9lh), for these reason FIRM is actually loaded from its CXI "container". (you can be sure the first thing that was thought of was to decrypt the FIRM partition)
Either way, there is plenty of space in FIRM0 to add a whole a9lh payload it could also be added to some unused nand area in RAW format I guess.