By tearing down bootleg network switches, researchers found ample opportunity for malice—but no signs of a backdoor this time.