TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Remote Code Execution to Persistent Backdoor in TP-Link Surveillance Camera

3 点作者 drbenway大约 5 年前

3 条评论

drbenway大约 5 年前
I reported this to TP-Link today. Developers please remember to not pass unsanitized input from the internet to the command line It's scary how vulnerable these IOT devices are- especially the ones marketed as security orientated products
mmm_grayons大约 5 年前
Kudos to the author, nice work. It's sad that so many things are still so vulnerable. TP-Link gear is garbage; I think most people knew that already. Honestly, so is most consumer IoT/embedded gear . I did some analysis a while back and found garbage like open telnet ports, old software, and worst of all, cryptographic flaws like constant nonces and IVs. Not to mention the age-old flaw of no TLS on the management interface.
jlgaddis大约 5 年前
So, an RCE that requires you to know the admin password?