TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Remote Code Execution to Persistent Backdoor in TP-Link Surveillance Camera

3 pointsby drbenwayabout 5 years ago

3 comments

drbenwayabout 5 years ago
I reported this to TP-Link today. Developers please remember to not pass unsanitized input from the internet to the command line It's scary how vulnerable these IOT devices are- especially the ones marketed as security orientated products
mmm_grayonsabout 5 years ago
Kudos to the author, nice work. It's sad that so many things are still so vulnerable. TP-Link gear is garbage; I think most people knew that already. Honestly, so is most consumer IoT/embedded gear . I did some analysis a while back and found garbage like open telnet ports, old software, and worst of all, cryptographic flaws like constant nonces and IVs. Not to mention the age-old flaw of no TLS on the management interface.
jlgaddisabout 5 years ago
So, an RCE that requires you to know the admin password?