Rapid7, a company that specializes in IT security, released a vulnerability report on video baby monitors, which included TRENDnet’s WiFi Baby Cam, model TV-IP743SIC. The report claims that the WiFi Baby Cam has a fixed user name and password that could be accessed via a direct UART serial connection to the WiFi Baby Cam. When Rapid7 notified TRENDnet about their report, our security team took immediate action to validate the claim. While physical access would be required to exploit the vulnerability, TRENDnet has found a solution and users will receive a notification to update their firmware.
How it’s executed?
Physical access to the WiFi Baby Cam is required to exploit this vulnerability. To add a direct UART serial connection, the housing must be opened to modify the circuit board. A computer will then need to be connected to the serial connection to finally run a terminal communication program.
Update Date: 02/25/2016
Affected TRENDnet products:
|Model name||Hardware Version(s)||Firmware Version(s)||New Firmware to Fix Exploit|
|TV-IP743SIC||V1.0R||1.0.1 and all previous versions||1.0.3|
|TV-IP562WI||V1.0R||1.0.3 and all previous versions||1.0.4|
|TV-IP662PI||V1.0R||1.0.3 and all previous versions||1.0.4|
|TV-IP662WI||V1.0R||1.0.3 and all previous versions||1.0.4|
|TV-IP762IC||V1.0R||1.0.2 and all previous versions||1.0.3|
|TV-IP862IC||V1.0R||1.0.2 and all previous versions||1.0.3|
|TV-IP745SIC||V1.0R||1.0.0 and all previous versions||1.0.3|