Typically low level attacks such as these is where it starts because they grant access to parts that can be used to learn more about the system as a whole.
This understanding then can be used to find easier to exploit avenues.
A good example of this is the history of exploits on Nintendo hardware.
They almost all started with finding an exploit at the hardware level, which then subsequently lead to finding software exploits and ways to leverage them in an easy way for end users.
Apparently if you try to use the USB port it’ll stop after having printed 20 or so pages, telling you you need to setup WiFi and install their bloatware app.