It's possible to access restricted hidden device nodes from kailed environment.
vulners.com/securityvulns/securityvulns:doc:9250