I don't thin there would really be anything to exploit because it sounds like the data lines in the actual usb connection are turned off and only the power lines remain enabled to allow for charging.
But how will you influence that said software if there's no way for you to talk to the device? This closes one exploitable avenue after 7 days - now attackers need to find something else.
The cat and mouse game continues.