https://gist.github.com/Wack0/a3435cafa5eb372b190f971190a506b8
Is This Another Camera Hacking Attack?
From the comments and looking at the source on github it looks like someone took firmware for some consumer cameras and decompiled/analyzed it running in an emulator (QEMU), and found a vulnerability.
The potential hack has not been tested on any actual devices (yet). However, this is exploiting a flaw in the webserver that runs the camera, so you would not need uncommon ports like telnet open to take advantage of this, any camera setup for remote access could theoretically be exploited.
Thanks for tip, we will keep an eye out to see if this evolves into a real-world threat.
The affected brands are:
UCam247
Phylink
Titathink
YCam
Anbash
Trivision
Netvision
Same here, only heard of YCam. Apparently the vulnerability lies within the popular and free embedded web server goahead.
So the cameras may or may not be related to a single manufacturer.
These cams and goahead web server have been getting beat on for a while now, here's some hacker news.
The link you shared is not working for me. Can you please provide an updated link?
Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.