User Tools

Site Tools


eop:home_electronics:home_security_devices

Home Security Devices

For the realm of devices that serve to enhance the security of one's home. Of course, they are also “Smart home” devices, as otherwise they would not be technological enough to get on this wiki. Most of them seem to run Linux-based OSes on either ARM, RISC, or MIPS architectures.

Alarm.com ADC-v520IR

Operating Systems

Linux

This device ships with an open U-boot installation

Like many of the exploiteers devices on this list (if not all of them), this camera device already runs Linux. This is simply a method to exploit it’s existing install in a capacity which allows the user some root function. A login console on this device is accessible through UART, which during a period, allows access to the filesystem as root.

https://www.exploitee.rs/index.php/Alarm.com_ADC-v520IR

Operating Systems

Linux

Post auth root via arbitrary command injection

Yet another exploit that allows execution of root commands on a device which already runs Linux. This method involves a poorly sanitized Wi-Fi configuration form for this Wi-Fi camera.

https://www.exploitee.rs/index.php/DLink_936L

Samsung SDR-3102N

Operating Systems

Linux

Startup script detects a FAT USB Drive

With either UART or an exploited USB drive, it is possible to access root on this security DVR system (presumably for monitoring many cameras at once). The USB method is easier, as it only requires creating a file on the drive that is named “diag_1673”, which simply is a suitable script.

https://www.exploitee.rs/index.php/Samsung_SDR-3102N

Samsung SmartCam (?)

Operating Systems

Linux

This little Wi-Fi camera has a modicum of exploits available for it, which for the most part, offer some method of root access to the filesystem and kernel. Users can pick the method that is best suit for their available tools.

https://www.exploitee.rs/index.php/Samsung_SmartCam

eop/home_electronics/home_security_devices.txt · Last modified: 2022/04/22 22:35 by io55admin