<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: How to hack a security CCTV camera (video) » TechWorm</title>
	<atom:link href="http://www.epanorama.net/blog/2016/10/11/how-to-hack-a-security-cctv-camera-video-techworm/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/10/11/how-to-hack-a-security-cctv-camera-video-techworm/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 06 Apr 2026 10:20:53 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/11/how-to-hack-a-security-cctv-camera-video-techworm/comment-page-1/#comment-1540265</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 10 Mar 2017 11:04:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=47896#comment-1540265</guid>
		<description><![CDATA[Nearly 200,000 Wi-Fi Cameras Are Open To Hacking
https://it.slashdot.org/story/17/03/09/2212227/nearly-200000-wi-fi-cameras-are-open-to-hacking

What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking. The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.

Nearly 200,000 WiFi Cameras Open to Hacking Right Now
https://www.bleepingcomputer.com/news/security/nearly-200-000-wifi-cameras-open-to-hacking-right-now/

What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.

The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.

Security researcher Pierre Kim says the firmware produced by this Chinese vendor comes with several flaws, which have all made their way down the line into the products of other companies that bought the white-label (unbranded) camera. In total, nearly 1,250 camera models based on the original camera are affected.

According to Kim, the cameras are affected by a total of seven security flaws. The biggest ones are listed below.

Backdoor account - Telnet runs by default, and everyone can log in with the following credentials

Pre-auth info and credentials leak - An attacker can bypass device authentication procedures by providing empty &quot;loginuse&quot; and &quot;loginpas&quot; parameters when accessing server configuration files

Pre-auth RCE as root - An attacker can bypass the authentication procedure and execute code on the camera under the root user just by accessing an URL with special parameters.

Streaming without authentication - An attacker can access the camera&#039;s built-in RTSP server on port 10554 and watch a live video stream without having to authenticate

Cloud - The camera provides a &quot;Cloud&quot; feature that lets customers manage the device via the Internet. This feature uses a clear-text UDP tunnel to bypass NATs and firewalls. An attacker can abuse this feature to launch brute-force attacks and guess the device&#039;s credentials. 

Nearly 200,000 vulnerable cameras available online right now

Yesterday, Kim said that around 185,000 vulnerable cameras could be easily identified via Shodan. Today, the same query yields 198,500 vulnerable cameras.

&quot;I advise to IMMEDIATELY DISCONNECT cameras [from] the Internet,&quot; Kim said in a blog post. &quot;Hundreds of thousands [of] cameras are affected by the 0day Info-Leak. Millions of them are using the insecure Cloud network.&quot;]]></description>
		<content:encoded><![CDATA[<p>Nearly 200,000 Wi-Fi Cameras Are Open To Hacking<br />
<a href="https://it.slashdot.org/story/17/03/09/2212227/nearly-200000-wi-fi-cameras-are-open-to-hacking" rel="nofollow">https://it.slashdot.org/story/17/03/09/2212227/nearly-200000-wi-fi-cameras-are-open-to-hacking</a></p>
<p>What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking. The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.</p>
<p>Nearly 200,000 WiFi Cameras Open to Hacking Right Now<br />
<a href="https://www.bleepingcomputer.com/news/security/nearly-200-000-wifi-cameras-open-to-hacking-right-now/" rel="nofollow">https://www.bleepingcomputer.com/news/security/nearly-200-000-wifi-cameras-open-to-hacking-right-now/</a></p>
<p>What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.</p>
<p>The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.</p>
<p>Security researcher Pierre Kim says the firmware produced by this Chinese vendor comes with several flaws, which have all made their way down the line into the products of other companies that bought the white-label (unbranded) camera. In total, nearly 1,250 camera models based on the original camera are affected.</p>
<p>According to Kim, the cameras are affected by a total of seven security flaws. The biggest ones are listed below.</p>
<p>Backdoor account &#8211; Telnet runs by default, and everyone can log in with the following credentials</p>
<p>Pre-auth info and credentials leak &#8211; An attacker can bypass device authentication procedures by providing empty &#8220;loginuse&#8221; and &#8220;loginpas&#8221; parameters when accessing server configuration files</p>
<p>Pre-auth RCE as root &#8211; An attacker can bypass the authentication procedure and execute code on the camera under the root user just by accessing an URL with special parameters.</p>
<p>Streaming without authentication &#8211; An attacker can access the camera&#8217;s built-in RTSP server on port 10554 and watch a live video stream without having to authenticate</p>
<p>Cloud &#8211; The camera provides a &#8220;Cloud&#8221; feature that lets customers manage the device via the Internet. This feature uses a clear-text UDP tunnel to bypass NATs and firewalls. An attacker can abuse this feature to launch brute-force attacks and guess the device&#8217;s credentials. </p>
<p>Nearly 200,000 vulnerable cameras available online right now</p>
<p>Yesterday, Kim said that around 185,000 vulnerable cameras could be easily identified via Shodan. Today, the same query yields 198,500 vulnerable cameras.</p>
<p>&#8220;I advise to IMMEDIATELY DISCONNECT cameras [from] the Internet,&#8221; Kim said in a blog post. &#8220;Hundreds of thousands [of] cameras are affected by the 0day Info-Leak. Millions of them are using the insecure Cloud network.&#8221;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
