This sentence right here shows why ASLR is a foundational and useful exploit mitigation:
"This creates a situation where it’s possible to build a dictionary of addresses for a given firmware, then repeatedly launch the exploit until we have brute forced the correct set of addresses."
We in #HardenedBSD use the PaX model for our ASLR implementation. We use the PaX model because it has a proven successful track record.