Backdoor functionality should be avoided as much as possible. Various discoveries show that those backdoors can and will be discovered and used for malicious purpose.
Functionality used to connect back to vendor/manufacturer services (often referred to as phone home) should be evaluated for its necessity. If the functionality is required for the function of the device, it must be implemented taking highest security requirements for typical IT/software systems into account.