By, uav-jp 28/07/2022

Web camera is hijacked!Vulnerability of internet equipment, verified and asked experts [Initial B] --NTERNET Watch

 Let's test what kind of behavior the vulnerabilities mentioned above are tested.

 I used KEIAN's network camera "C7823WIP" that I touched at the beginning.At the time of this article, the latest firmware "48".53.75.It is used with "98" updated.First, the method introduced on the reference site was performed using "Kali Linux" from the same LAN.

Webカメラが乗っ取られる! ネット機器の脆弱性、検証して専門家に聞いてみた【イニシャルB】 - INTERNET Watch

今回利用したカメラの設定画面。バージョンは48.53.75.98

 From the conclusion, the only vulnerabilities mentioned above were only 4 and 5 in this test.It is impossible to compare because the old version of the firmware is not available, but it is probably due to the renewal of the firmware to prevent vulnerability.

 In addition, the latest firmware was devised to make it difficult to access from the outside, and a port for accessing a web server was also equipped with a mechanism that was randomly changed by restarting.

 For this reason, 4 and 5 attacks are possible at present, but for the following reasons, it can be said that external attacks are very difficult.

 In other words, as long as you change your password to a complicated one after purchasing, it is unlikely that you will be allowed to enter from the outside at this time.Please understand this point.