Select Page

Hackers break into Samsung Smartcam again

Samsung’s SmartCam has fit into users’ DIY surveillance setups for years thanks to its smartphone control and local (non-cloud) storage. But at last August’s DEFCON 22 security conference, members of the hacking blog Exploiteers listed exploits for the networked camera that allowed remote camera execution and let them change the administrator’s password. Rather than fix it, Samsung ripped out the accessible web interface and forced users to run their SmartCams through the device giant’s SmartCloud website. So, like good little hackers, Exploiteers broke into the camera again with a different exploit.

Samsung had patched the original vulnerabilities but left one set of scripts untouched: The php files which provide firmware updates via the camera’s “iWatch” webcam monitoring service. Those scripts have a command injection bug allowing a user without admin privileges to allow root remote command execution. Exploiteers helpfully provided a technical writeup explaining how to do it, fix the vulnerability and even re-enable the web interface.

Download your "Special Report on Passwords and Password Security"

You have Successfully Subscribed!

The Next Masterclass is Coming Soon!

Fill out the form below and be notified as soon as the registration for the next Masterclass opens.

Thank you, we'll notify you as soon as the Masterclass registration opens!