Table of Contents
Home Security Devices
For the realm of devices that serve to enhance the security of one's home. Of course, they are also “Smart home” devices, as otherwise they would not be technological enough to get on this wiki. Most of them seem to run Linux-based OSes on either ARM, RISC, or MIPS architectures.
Alarm.com ADC-v520IR
Operating Systems
Linux
This device ships with an open U-boot installation
Like many of the exploiteers devices on this list (if not all of them), this camera device already runs Linux. This is simply a method to exploit it’s existing install in a capacity which allows the user some root function. A login console on this device is accessible through UART, which during a period, allows access to the filesystem as root.
DLink 936L
Operating Systems
Linux
Post auth root via arbitrary command injection
Yet another exploit that allows execution of root commands on a device which already runs Linux. This method involves a poorly sanitized Wi-Fi configuration form for this Wi-Fi camera.
Samsung SDR-3102N
Operating Systems
Linux
Startup script detects a FAT USB Drive
With either UART or an exploited USB drive, it is possible to access root on this security DVR system (presumably for monitoring many cameras at once). The USB method is easier, as it only requires creating a file on the drive that is named “diag_1673”, which simply is a suitable script.
Samsung SmartCam (?)
Operating Systems
Linux
This little Wi-Fi camera has a modicum of exploits available for it, which for the most part, offer some method of root access to the filesystem and kernel. Users can pick the method that is best suit for their available tools.