This is an IPVM report available to you via this special link only until Sep 30, 2024 04:00 AM

Dahua Wiretapping Vulnerability

Published Aug 02, 2019 11:30 AM

IPVM has validated, with testing, and from Dahua, that many Dahua cameras have a wiretapping vulnerability. Even if the camera's audio has been disabled, an attacker can still listen in unauthenticated.

IPVM Image

Inside this report, we examine how it works, how it was originally found in an OEM partner's product, what Dahua has done and not, to date, to fix it.

Executive Summary

Here is what we have determined so far:

  • Dahua has quietly fixed this in some of their models (in a June 2019 release we tested) after a researcher reported it.
  • However, Dahua had not notified the public about this vulnerability and we can find no notice from Dahua online (e.g., the official Dahua USA cybersecurity update section has no listings for 2019 as of August 2, 2019).
  • Dahua has acknowledged one of two vulnerabilities still exists and that some models may not be fixed for either. We are awaiting further clarity about what models were affected, which have been fixed and which are not yet fixed.
  • Dahua cameras ship with audio enabled by default. Even if it is or was manually disabled, the vulnerability still worked.
  • UPDATE: Dahua has issued a security advisory today August 2, 2019 - VideoTalk function of some Dahua products have security risks, in which they say they knew about this in 2018 yet never disclosed this.

We have not determined what of the dozens of Dahua OEM partners are impacted, outside of Amcrest, where this was originally found, but given that Amcrest and Dahua branded cameras are impacted, it is likely that many others have this vulnerability as well.

Statement From Dahua

Dahua spokesperson Tim Shen provided this statement to IPVM:

Dahua Security Team and R&D Team have conducted an emergency investigation, and the preliminary results are as follows:

  1. Video talk unauthorized download vulnerability - Due to the relevant functional modules have been code refactored, this vulnerability does not exist after refactoring. Some EOL products may have security risks. We have a plan to repair the related products.
  1. Replay attack vulnerability: This vulnerability is a newly discovered and it does affect some Dahua products. We are still investigating the scope of impact.

Dahua uses the secure login authentication method “Digest” by default, but in order to be compatible with early devices, we also retain support for the login authentication method with insufficient security. This vulnerability just exploits these insecure login authentication methods.

Compatibility is a common problem faced by manufacturers in the industry, and we are working hard to solve this problem. [emphasis added]

Dahua Vulnerability Explained

The vulnerability was first reported to Dahua in May 2019. Research Engineer Jacob Baines of Tenable uncovered a vulnerability within an Amcrest (Dahua OEM) camera's firmware (PoC found here, CVE-2019-3948), which allows unauthenticated access to the audio stream. The endpoint, /videotalk, can be accessed unauthenticated.

Baines video embedded below demonstrates the exploit:

Based on that, IPVM began researching Dahua models and successfully gained unauthorized access to the audio stream using three separate methods.

First, we targeted a Dahua camera (specifically the 4K Starlight box camera, IPC-HF8835F tested here) with the script used to exploit the Amcrest camera. The gif below demonstrates connecting the to the endpoint and the download starts.

Dahua-Unauthorized-Audio-Connection

The output file not created due to either a flaw in the original PoC or format/protocol mismatch between Amcrest (alaw) and Dahua.

The next method was using VLC media player to open the stream, again without being prompted for credentials. It appears that VLC is not playing the audio, however using wireshark shows the data stream immediately upon the sending the VLC command. Our test workstation is 172.20.128.117, and the camera is 172.20.129.132 below.

Dahua-Audio-Stream-Shown-in-Wireshark

Then we were more simply able to hit the /videotalk endpoint in a browser and initiated the audio stream / download.

Dahua-Vulnerability-Accessed-via-Browser

Disabling Audio Does Not Resolve

IPVM originally tested the camera after factory defaulting it (audio is defaulted on) and was able to gain unauthorized access. However, even after disabling audio within the camera's web interface, we were still able to get access via all of the methods outlined above.

June 2019 Firmware Fixes In Model Tested

After updating to firmware 2.622.0000000.7.R, Build Date: 2019-06-19 the endpoint is protected with a username / password dialog box as shown below and the attacks described above failed.

IPVM Image

There are no release notes available with the firmware explaining that a known vulnerability was fixed, nor is there any evidence that this was communicated in any other way.

Problematic Response From Amcrest Technical Support

Amcrest's response was also problematic and confusing. The vulnerable firmware is a higher revision (2.5xx) than the patched firmware version (2.4xx), which is atypical, to say the least.

On our first call, we explained the vulnerability and confusion about the firmware release and our desire to verify that information is accurate. Amcrest hung up on us. On our second call, we were told that the firmware addressed compatibility with chrome and email alerting improvements, but had nothing to do with audio. The release notes mention vague "Additional security enhancements." but no clarity about the specific vulnerability at risk.

Risks Higher With Audio

While video vulnerabilities have definitely increased in awareness and attention, audio is even more sensitive as laws tend to be stricter about audio being recorded without consent. These Dahua vulnerabilities enable wiretapping. While most IP camera users do not use audio, that this can be exploited without any such use or even if explicitly disabled, raises real concerns.

Problems With Dahua Response

As problematic is Dahua's lack of response and disclosure. Dahua has known about this for nearly 3 months (reported on May 8th, today is August 2nd). Yet despite that, they have not issued a public notification nor given any clarity about what specific models are or are not impacted and, by their own admission, still have another vulnerability to fix.

This is not a new problem for Dahua. In 2017, when they had their massive backdoor, they struggled for many months to properly and clearly communicate and fix what was vulnerable.

Given their US government ban, Dahua may be understandably reticent to call attention to new vulnerabilities. However, if they do not and are caught, as they are here, it further decreases trust.

UPDATE

UPDATE: Dahua has issued a security advisory today August 2, 2019 - "VideoTalk function of some Dahua products have security risks", in which they say they knew about this in 2018 yet never disclosed this.

Comments (52)
JH
John Honovich
Aug 02, 2019
IPVM

******: ***** *** ****** * ******** advisory ***** ****** *, **** -********* ******** ** **** ***** ******** have ******** *****, * ******* ********* ** ** show ****** ******** *****:

***** ** ********* **** **** ***** this *** **** **** * ****, fixed **, ********* ** **** ** 2018, *** ***** ********* ** ***** today:

***** ***** ************* *** ******** ********** code ** ****, **** ************* ** longer ******.

(1)
(1)
UI
Undisclosed Integrator #1
Aug 02, 2019

*** ****** ****** ********* ***** ***** wiretapping ** * ************ ******?  ** they **, **** *** ** **** have ***** ****** *** ***** **** around ***** *****.  *** *** ***** listened ** *** *** **** ****** you *** ***** * ********** *** don't **** ******** ** ****.  ***** me **** *** ********* ****** *** with *** ****** ****** **** ******* wiretapping **** ****** ******* *******.  ** I ****** ** ******* **** ****** I ***** ****** *** ******** **** in *** ***** ** ***** ******** in * ******* **** *** ******** it * *** **** *****.  

*** ***** ****** *********** *** ** not **** **** *** ***** **** MAC ************** ** *** ******* ********.  Are ***** *********** *** ***'* **** what * ******* ****** **?  **** are *** *******, *** *** *************.  If ******* *****'* **** *** ** use *** ****** ** ***** *** is **** ****'* ***** ** **** run **** * ***** ****?  ************ is *** **** ***** ** ***** security.

(3)
(19)
(2)
(3)
JH
John Honovich
Aug 02, 2019
IPVM

*** ****** ****** ********* ***** ***** wiretapping ** * ************ ******?

***, ****** *** ********** *********. *** uproar **** ****'* ****** ********** ***** this **** ** *** ***** *******, e.g. ****** **** ****’* ****** ********** *** ‘never ******** ** ** * ******’

*** *** ***** ******** ** *** the **** ****** *** *** ***** a ********** *** ***'* **** ******** at ****.

*** *** ***** **** *** **** people ** *** ****** **** ************ are ********** ***** ************* '*** *** time'. *** *** ******* ** *** uproar *****.

*** ***** *********** *** ***'* **** what * ******* ****** **? **** are *** *******, *** *** *************.

** ***** ***** * ************* **** integrators *** **** **** * **** and **'* *** **********'* *****? ** you ***** ***** ****** **** ********* this **** *****? *** ** *** not?

(16)
(1)
UI
Undisclosed Integrator #3
Aug 02, 2019

*** ***** ****** *********** *** ** not **** **** *** ***** **** MAC ************** ** *** ******* ********. Are ***** *********** *** ***'* **** what * ******* ****** **? **** are *** *******, *** *** *************. If ******* *****'* **** *** ** use *** ****** ** ***** *** is **** ****'* ***** ** **** run **** * ***** ****? ************ is *** **** ***** ** ***** security.

**** ** * ***** ***********.  ** are *** ****** ** ******'* ******** what ****** **.    **** ********* product ** **** ******* **** ** installed ** ***** ***** **** ********* IP ** ********* ** ******** ** government *****.  ***** **** **** ***** be ** ***** ********* **** *** pressing *** ******, ***** *** **** covered ** *** *** **** *****'* manual.  DId ***** ******** ** *** *** easily ********* ****-******* ************ ** ***** devices ** *** ******* ******?

(5)
(3)
U
Undisclosed #4
Aug 02, 2019

* ** ****** **** *** ***** paragraph **** *** ***** ** ** satire *** **** ** *** ** the ****** ******** ******** *** ****** said. *** **** **** ******* ***** even ******* ** ****** ** ******* this ************* ** ********** ****-******* ** me...

(7)
(2)
UM
Undisclosed Manufacturer #9
Aug 05, 2019

**** ***'* **** *** ******, ** is ***** ****** ** ********.

**** ** **** ******* *** **** the ******* ******* ** **** *** can ** ******** ** *** **** there ** * ****** ******. ***, you ***** *** **** *** ** a ****** *** *** **** ****** would **** ** *** ** **** garage *****, *** *** ***** ****** the ***'* ******* ****** ** ** secure.

(5)
UI
Undisclosed Integrator #3
Aug 02, 2019

* ***** ** ********** ** *** how **** **** *** ******** ** this.  ***** *** **** **** ******* names ** ***** **** ** *********** - *****, *********, ***.

(1)
(2)
JH
John Honovich
Aug 02, 2019
IPVM

*** **** **** *** ******** ** this. ***** *** **** **** ******* names ** ***** **** ** *********** - *****, *********, ***.

*** **** *** ***** *** *********...

**'* * **** ********. ******* ******** is *** **** ** ***** **** have **** **** **** ** ***** that ***** *************** *****?

(3)
(7)
UI
Undisclosed Integrator #3
Aug 02, 2019

*** **** *** ***** *** *********...

********* *****'* ****** **** ** ** my *****.

* ** ***** **** ** * serious ***** **** ** *** ***** covered.  ** *** ******** *** *********** this *********** ** **** **** **** large, **** ******* ****** **** ***** themselves ** **** ********.  ***** *** their **** **************, ********* *** ****** security, ***.  *********, **** *** ****** truckloads ** *********** ******* ** **** their **** ****.

(2)
(1)
(1)
Avatar
Guilherme Barandas
Aug 03, 2019

*********??? ***** ** ****..** ****.

(1)
JH
John Honovich
Aug 03, 2019
IPVM

*** ****. ** *****, ********* **** ********* ******* ***** in ******* **** *** *** ********* ******* camera, **** ***** *** ***** *** their ******* ****.

**** ****, ************ *-******, *.*. *** **** *** in *** ********** ***** ****. *** ********* *** not ****** ****** *****, **** **** us **** **** **** ******** ** the **.

(1)
(1)
Avatar
Guilherme Barandas
Aug 05, 2019

** ******, **** ***** *** **** was *********, ********** ******** ** ************. However ** *** ** ****, *** of ****.

JH
John Honovich
Aug 05, 2019
IPVM

*** **** '** ****', *** ** more ** ****** ** * *** to ******* **** ********* *** ********* to *** ***** ** ********* ***** of *** ***** **** **** *** even ***** *****.

(1)
Avatar
Ethan Ace
Aug 02, 2019

** **** * **** ** *** many ****** **** ******* **. **** based ** *** *******, ** ******* to ** ***** *** *******, **************, and ***** **-** ****. ******/****** ****** a *** ** ****** ** *****'* mid-range, ***** **** **** "***-*****" ******** and "***" ** "****" ****.

******* *** ******* ***** *** **** likely ** ******* *****-** ****, ****** the ************* ********** ****** *** ***** models. *******, *** ******** ** ******** models** ********** *****-** ****, *** ******* ******* mic/line ******. ***** *** ****** ** audio ***, **'* ******** ******** ** connected ** **** ** *** *****.

************, *****'* ******** ** *** ****** North ******** **** ******* ***** **** checking *** ************* **** **** ********* for ***** ** *** ** *** Canada. **** **** *** ******** * list ** ***** ******** ****** ******** and ** *** **** * ******** available ***** *********. ** ****** ***** of **** * ****, *** ** know.

(3)
U
Undisclosed #2
Aug 02, 2019

******* **** ****** ***, ******** ***** not *** *** ***** ******* ** Kali ** ******. *** ***** ** that **** ** ***** ** ** head. * **** *** *** *** undisclosed *** ***** **** **** ** save ***** *** **** ** ****** Dahua ******* ********* ** ********* ********** rooms. * **** ***** ******* * Dahua ****** ** ** **** *** if *** ****** **** ******* ** this ******* * **** *** *** just ********* *** **** *** **** the **** ********* ** ******* *****.

(1)
(6)
UM
Undisclosed Manufacturer #5
Aug 02, 2019

** *** ***'* *** *** **** repeating *** **** ****, ****** ** the ****** *** **** *******! :-) Enjoy

***'* **** *** **** *********** ***'* get ** ***** ***** ********** ****. Can *** ******* *** **** ******** issues **** ***** **** ** *** real *****?

(1)
U
Undisclosed #6
Aug 02, 2019
IPVMU Certified

...***** ** **** **** ********* ** laws **** ** ** ******** ***** audio ***** ******** ******* *******. ***** Dahua *************** ****** ***********.

*********** ** *** ***, ******* ******** with *****-** **** *** ***** ********* enabled ** ******* *** *************** ********* conversations ********.

 

(1)
JH
John Honovich
Aug 02, 2019
IPVM

******* ******** .... *************** ********* ************* everyday

** *** **** ***** *** ** least * ** * ******* ** a ***** ******, ****. **** *********** is **** **** ** **** **********. What ******** ** ****** ** *** have ****** ****?

* ** ***** **** **** ******** point **** ***** ****** ** ******** on ** *******, ** *******. *******, most *****, ** *** **********, ******* audio ********* *** ****** *** ** cameras ** *** ****** ******** ** default, ** ******* **'* ***** ******* to ************ ****** ***** ** ***** surveillance *******.

(1)
U
Undisclosed #6
Aug 02, 2019
IPVMU Certified

*******, **** *****, ** *** **********, disable ***** ********* *** ****** *** IP ******* ** *** ****** ******** by *******...

*** *** *** ** ** ****, I’m ******************* ***** ***.  *’** **** *** other ********.  

Avatar
Sean Patton
Aug 05, 2019

**** ** ************ ******* ***** ********* audio ** ******* ** ********* **** configured ****** * ******; * ******* our ********* ******* *****, *** ***** most ** **** ******* * ************* to ****** ***** *** *** *******/*******, I *** *** **** ** **** one **** ** ******* ******* ***** recording.

*******, * ** ********* ** "** default" ** *** "***-**-***-***" *******, ******* unless ** ************* ******* *** ****** it ** ********** ** ***.

** ** ** *******, ******* *** an ****** ** ****** "****** *****" as *** ****** ******* *******, ***** can ** ******* *** *** ******* during *** ************ ******, ** ********* in *** ****** ****, *** *** installation ******* ******* ** ***:

* *** **** **** ** ***** 6 ***** *** ****** ******* ** notes ** * *** ***** ***** tests *** ******* **** ** ** recording ***** "**" ** *** ***-**-***-*** setting.

 

(4)
(1)
U
Undisclosed #6
Aug 05, 2019
IPVMU Certified

* *** **** **** ** ***** 6 *****...

 *** ****’* **********! ****** *** *** clarification.  

* ******** ******* ** ********** ** audio ***** *********** ***** ******** ** any **** ** ********** *******.

*************, ******** ***** ********* ***** ******* ** ******* ** *********, **************,***** ***** **** *** *** ** eavesdropping ** ***** ********* ** *** default ******, **** ** ********** * live **** ** *** ******.

(1)
(1)
U
Undisclosed #2
Aug 05, 2019

(**#* ***)..................***** ** ***** ** **** old ***** ***** *****.....

 

**,*********** ******** ** * **** **?  

**** ******* @ **#*    /***

U
Undisclosed #6
Aug 05, 2019
IPVMU Certified

**,*********** ******** ** * **** **?

***** *********, *** **** ** * child **. - ****

 

 

(2)
UE
Undisclosed End User #10
Aug 05, 2019

** *** ********* ******** ********, *** need ** ******** ****** *********** *** speakers, **** *** ** ******* ******** for ***** ***** *******.

**** *** ******** ************* ****** ******* 2019 ** :

(1)
U
Undisclosed #6
Aug 05, 2019
IPVMU Certified

******* **** **** ******* ****?

**** *********** ************/******* **** ****: 

UE
Undisclosed End User #10
Aug 05, 2019

**, ***'** ***** ***** *** *** versions ?

* ******* ** **** ******* ***** the *** ****-********, ********* ****** *** Corporate, **** ***** *** **** ******** and ****** ***********.

 

U
Undisclosed #6
Aug 05, 2019
IPVMU Certified

* ******* ** **** ******* ***** the *** ****-********, ********* ****** *** Corporate...

****, *** **** ***** ***** **** you ****:

************** ******** ********, *** **** ** manually ****** *********** *** ********...

** *** *****, **** ****** **** is **** **** *** ***** ***** R1, ** ***** ******.  ** **** have ******* ** ** *** **** 6 ******, **** *** ****.  

 

(1)
UI
Undisclosed Integrator #14
Aug 07, 2019

* ****** ***** ******* * ******** camera ** *** ****** *** ******* it ********** **** ***** *** ******* by *******. * ******* **** *** careless ** *** ************ ***** *** audio ** ******* ** **** ***** of *** *****.

U
Undisclosed #6
Aug 02, 2019
IPVMU Certified

*** ** *** ***** * ******** stream ** ***** ****? *****’* *.*** allow ********* ** *****?

*** **** **** ***** *** ***** with *****?

JH
John Honovich
Aug 02, 2019
IPVM

****...********:

*** ***** **** ** **** ***** are ****** ***** ******** *** ******** think **'* * **** **** ** buy ***** ******* *** **** ** things **** ******** *** **********.... **** are *** ****** ** ******** ** that *** **'* *** **** ** counter **** ***** ** ******.

(1)
(10)
U
Undisclosed #7
Aug 02, 2019

***** ***** ****** **** ******* ********. A ****** ***** **** ** ********** damage *** *** ** **** ** from ******* ** *****. 

(1)
UM
Undisclosed Manufacturer #13
Aug 06, 2019

* ************ ***** ******* **** * Dahua *** **** ****, ******* ******** it *****, *** **** ****** **** ended **'* *************.

UM
Undisclosed Manufacturer #8
Aug 02, 2019

** ****** **** **** *** ** their ********* **** ******* *** **** so **** *** **** ** *****......

(2)
JH
John Honovich
Aug 05, 2019
IPVM

**** ***** ******* ***** ** ********:

*** **'* ******** ***** *** **** of ***-*** ***** *** *** ***** is *** *****'* ******-******* ******** *** aims ******** ** ** ** ********** provider, ***** ***** *** *** **********, much **** ***** **** ********.

(1)
U
Undisclosed
Aug 05, 2019

** *** **** ** *********** **** about * *********** ********* ******* *** should ** *********** **** ********** ************ registry ** ** *** ********.  **** Tenable **** * ********* - ***-****-****.  Otherwise *** **** ***** ******* **** a ********* ******** *** **** ****** up ** * ******* ******** ** get ** **** ****** *** *** other ******-***'*.  *** **** *** ******** here ****** **** *** ****** ******** around ** *****.

(***'** *** *** ***** **** ****.  we're ***** ********* *** ******** ****** whether *** **-****** ******** *** ****** the ************* ******* *** ****** *** or *** *** ********** ** ****** job...)

 

 

JH
John Honovich
Aug 05, 2019
IPVM

********* *** **** ***** ******* **** a ********* ******** *** **** ****** up ** * ******* ******** ** get ** **** ****** *** *** other ******-***'*

** ****** ** *** ** *** multiple ********** **** *** ************, ***** is *** *** **** **** **** listing * ********* ******. *'** ***** the ********* ****** *** **'* * bit ***** ** ********* ** **** we ***** ***** ********* ** *********.

(1)
U
Undisclosed
Aug 05, 2019

** **** *** *** *** **** to *** "*********" ********* ** **** the *********.  **** *** ***** ** the ******* ******* *** ***** *** your **** ********** *** *** (***) saw **** *****.  ****'* *** ***.  When ** *** ***** ****** *** have ** ****** **** ***** ** new *******/****** ** **** ** **** through *** ********'* ******** ** ** that.  **** ** *******.  * ** giving *** *** **** ***** ** feedback * **** ** ***** ***** or *** ***** ** *** ******** since *** *** ***** ** * legitimate **** ****** ** **** **** of *****.  **'* ******.  ** *** known.  *** ****** ** ******** ************.  Of **** *** ****** ****** ** your ******* ** ******** *** *** vendor's *** ********.   ******** *** ** us ******* **** **** ** ****** out ** ** *** ** **** and ****** ****.

(1)
U
Undisclosed #6
Aug 05, 2019
IPVMU Certified

******** *** ** ** ******* **** have ** ****** *** ** ** can ** **** *** ****** ****.

* **?

UI
Undisclosed Integrator #11
Aug 05, 2019

**** ** **** *********. *** **** I **** **** ****, ** ***** me ****** ***** * *** ****** I **** ******* **** ***** *******. 1. ** ** *** ******** ** set ** *****, **** *** ***** camera **** **** ** **'* ***** stream. * *** **** ** *** in *** ******, *** ** **** right **** ** ***** **. **** doesn't ****** ** * *** *** Dahua ******. *** . . . I **** **** ** ****** **** the *** *****'* **** *** ****** password, ** *** *** ***** ****** login ***********.  ***** ****** ** ** number *. * **** ******* *** default **** *** ******** ** * Dahua ****** *** **** ***** **** able ** ***** ******* *** *** with *****/*****, *** **** ******* *****.

*.***** ** ********* ***** ***** ** with *** ****. * *** *** a ***** ******'* **** *** **** look **** * *** ******* ***** and ** *** *** ****** ** a ********* ****, ******** ** **** off. * **** ***** ***** *******. I **** ***** ****** ** **** servers. *** ******* *** *** **** server. * **** *** *** **** manually **** ** ** **** * few ******* ***** ** **** **** it *** *** ****** **** ** hour. **** ***** ********* ** * disconnect *** ******** ******* **** *** internet. *****. *.*. ***** ****?

U
Undisclosed
Aug 05, 2019

** *** *** *** * ********* trace?  *** *** ***** *** **'* doing *** ******* ****?  ** **'* got * ********* *** ****** ** could ** ****.  **** ******* ******** after ******* ** ***** *** ********* NTP ****** **** **** ****** ** helpful ** ******* **** ** **** NTP ****** **** ****.  ******* ****** do **** ** ****** ** **** an *** ****** ** *****.  (** they *** **** *** **'* *** reported **** ******* * *** ******...)

(1)
(2)
UM
Undisclosed Manufacturer #13
Aug 06, 2019

*** *** **** **** *** **** phoning **** ** *** ***** ****** or ********. **** ****** **** ******* the *****.

(1)
UE
Undisclosed End User #12
Aug 05, 2019

***** ******* - * ** ************ interested ** **** ** *** ********* branded ******* (*** *******) *** ******** by ****....

Avatar
Evan Steiner
Aug 06, 2019

******* **** *** *** ********* ***** today. * ****** ** **** ** to ******* *** ***** *************. 

 



**** ****** ********, 

** **** ******** * *** ********* security *** ******* *********** ******** ****** for *** ********* ******* ****** ******: 

WiFi ******: 
 
****-****
****-****
****-****
****-****
****-****
 
PoE ******:
 
****-*****
****-*****

 
*** ******** ****** ************ *** ********* enhancements: 
 
 - ** ****** ******* *** ********* updated **** ******* ****** ** **********. 
 - ******** ************* **** ****** ******** ** *Chrome, ******, **** *** *******, ** plugin ** ********* ********. ******* ***********, IE **********.
 - *** ************* ******* **** ****** protocols **** *** ****. 
 - ***** ***** ***** ************* ******** to **** **** *********** **** *** and ***. 
 - ********** ******** ************.
 
 
****** *** *** **** ***** ** download *** ****** ********. ****** *********** the ********, ** ********* *** ** read *** ******* ** *** ** safely ****** ******** *** ** **** the *********:  
 
*. * **** ***** ** "******* ** default ********" **** ** ******** ** delete *** *** ****** **** 
*** ****** *** *** ********.

*. *** *** ******* *** ********* that *** ****** ** *** *** file ********* ** *** ** *** 
****** ** ****** ** ********, ***** to ******** ********, ** *** *** structure **** ** **** ** ********* them. Otherwise *** ******* ******** ** *** or *** **** ** *******.
 
 
Firmware ******** ****: 
 
****** **** **** **** ** ***** our ******** ********* **** ****** *****, to **** **** ****** ** ******'* firmware *** ****** ****. ** *** have *** *********, ****** **** **** to ***** ** **** ***** *** one ** *** ******* ****** **** get **** ** *** ** **** as ********. 

*******.***/*****************

*********,
******* ****
 
(1)
JH
John Honovich
Aug 06, 2019
IPVM

* **** ***** ** "******* ** default ********" **** ** ******** ** delete *** *** ****** **** *** enable *** *** ********.

****, ****** *** *******. **** ** super ********. *** ***** **** * manufacturer ******* ********** * ******* ** upgrade **? **'** ***** ***** **** is ***** ** **** *** **** update ** **** *******.

JH
John Honovich
Aug 06, 2019
IPVM
UM
Undisclosed Manufacturer #13
Aug 06, 2019

**** *** *'* *** *********** *** significance ** **** *****, *** ***'* it **** **** *** ***** ** be ** *** ***** ******* ** order ** ******** **** *****? ****** the ****** ****** ** ****-********* ** the ******* *****, ***** ** *** smart *** *** ***** ****.

U
Undisclosed #6
Aug 06, 2019
IPVMU Certified

** ****** ** ***** **** ******* is * *** **** *** ** old *******, ****** **. ********** *** they **** *****.  

*** ************, ****** *** * ******* of ***** *******, ****** ** *****, if *********, **** ** ***** **** a ******* *************, ******** ********* *** ****** ****** ** ****.

**** *****, *** ******* ** ****** Foscam’s ****** ** **** ******* *****:

**** ** *** **** **** ** their **** *******, *********** ****’* **** ***** of **** *** **** **** ** the ***** *****.  *****!

(1)
JH
John Honovich
Aug 06, 2019
IPVM

***** ******** ********** **** **** ******* of *** ************* **** ***** ** 2018:

**** ******* ******** ** *** **** determined **** ****** ******* ***** ** 2018 ********* ** ***** ************* **** Dahua *** ********** ******* **. **** vulnerability *** ***** ** **** ** code ************ ** *** *******. ******* Dahua *** ******* *** ************* *******, the ********* *** ** ** *** also ******* ** *** ****. ** a ****** ** **** ****’* ******** issue ***** *** *** ********** **** all ****** ******** ***** *** **** optimization ** ****** ******* *** *************, and ***** ** ******* ** ******* all ***** ****** ***** ********.

** ******** ** ****** *** **** did *** ******** ** **** ** July ***** **** *** ******** ** them.

U
Undisclosed #6
Aug 06, 2019
IPVMU Certified

***** ******** ********** **** **** ******* of *** ************* **** ***** ** 2018:

** **** ************ ***** **?  ****** like ***** ** **...

(2)
JH
John Honovich
Aug 06, 2019
IPVM

**** *****, ******** ** ********™...

JH
John Honovich
Aug 07, 2019
IPVM

***** *** **** *** **** ******** to ***** *******:

**** ** **********. **** ** **** did *** **** ***** ** ** 2018, **** ********* **** ***** ** by *** **** ******* *** ********** Jacob ****** ******** ** ****. ***** is ***** *** ********** *** **** waited ***** ****.

U
Undisclosed #6
Aug 07, 2019
IPVMU Certified

Code ************ *******: How’s it coming?

Code *********: So, this week I finished converting a ***** **** ** *** *****, *** *** ********** ***** ***** before *** *********** ****, ** **’** saving * *** ***** ****** ***** time *** **** ***** ** (!), and ** ************* ***** ****** **’** ever ****.  *** ***** *** *******, worldwide, ****** **** **!

Code ************ *******: Good, but what about that new audio stream code fragment that had you perplexed?

Code *********: No luck, so far.  I’m not sure I can do anything with it, the thing is already optimized to the max - there’s no user authentication or policy check or endpoint verification, it doesn’t even write to the logs! It’s just pure data on demand on a fat pipe... The guy who wrote it must have been a genius!

 

(2)