7 New Vulnerabilities Discovered In P2P Wifi Cameras

From slashdot post:

What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.

The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.

Security researcher Pierre Kim says the firmware produced by this Chinese vendor comes with several flaws, which have all made their way down the line into the products of other companies that bought the white-label (unbranded) camera. In total, nearly 1,250 camera models based on the original camera are affected.

At the heart of many of these issues is the GoAhead web server, which allows camera owners to manage their device via a web-based dashboard.

According to Kim, the cameras are affected by a total of seven security flaws. Yesterday, Kim said that around 185,000 vulnerable cameras could be easily identified via Shodan. Today, the same query yields 198,500 vulnerable cameras.

Proof-of-concept exploit code for each of the seven flaws is available on Kim's blog, along with a list of all the 1,250+ vulnerable camera models.

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

** ****** **** ****** ****** *** ***** *** **** ** second ******* *** *** **** ******* *********.

**********, * ***'* **** ** **** ** ****. ***** *** please ***** ***** ** ******* "*******".

****, ****** *** **** ** ******** ******* ***** **** *** pulled ****:

*****://**.********.***/*****/**/**/**/*******/******-******-**-**-*******-***-****-**-*******

* *** ******* ***** **** *******. ***** **** ** **** been ****** **** ** ***** (****** ****** **** **** * few ******** **** ** ***), *** *** ************* ** *** in ******* ************, *** ** *** *** ******* *** ****** was *****/********** ** *** ******* (**** **** *** **** **** any **** **********, **** ****** ** *****).

***** ******** **** ******* **** ***.

***** **** *** ******* *** ***** * ***** *****. * wonder *** **** **** *******.

**** **** ******* ** ******** ****** ***