• Français
  • English

IoT attacks are easier than you think

It is often assumed that cyberattacks on IoT devices require specialized skills and advanced tools. However, real-world incidents show that many vulnerabilities can be exploited with surprisingly simple techniques.

In this article, we will explore three real-world IoT attacks and detail the methods and tools used by attackers to compromise the following devices:

1. Wi-Fi Fireworks system Shoot Firefly
2. VStarcam CB73 Security Camera
3. Wyze cam v2 camera

These attack scenarios illustrate how an attacker can achieve full administrative access to IoT devices using only basic tools, such as a serial cable, standard Linux utilities, and free reverse engineering software.

We will also explore the critical security lessons learnt from each of these attacks.

Attack scenario 1: Wi-Fi Fireworks system Shoot Firefly

Firefly is a WIFI fireworks ignition system controlled by a mobile application.

Source: shootfirefly.com
Security researcher Matt Brown presents the attack steps in a video to help us understand the communication protocol used by the device [1].

Identifying a debug interface

An attacker gains physical access to the fireworks system’s casing and identifies a UART connector on the circuit board, labeled TXD, RXD, and GND—standard pin names for serial communication.

Recognizable UART serial connection pins on the board, Hacking a WiFi Fireworks Firing System – The FireFly Plus, Matt Brown, July 5 2024

Gaining Terminal Access

By connecting a serial cable to a computer, the attacker obtains shell access to the system. During boot, the system logs reveal the WiFi SSID and password in plain text.

WIFI access point SSID and password displayed in log in the terminal, Matt Brown, Hacking a WiFi Fireworks Firing System – The FireFly Plus, Matt Brown, July 5 2024

If users have not changed the default password, an attacker could remotely ignite fireworks, posing a serious security risk.

Intercepting and analyzing communications

To control the fireworks device, a mobile phone connects to the WiFi access point mentioned in the logs.
By executing a man-in-the-middle (MITM) attack, the attacker intercepts network traffic and discovers that no encryption or authentication is in place—making communications vulnerable to eavesdropping.

Reverse engineering the mobile application

To further analyze the system, the attacker reverse-engineers the Android application, which is easily downloadable from third-party app stores.
Since Android apps are developed in Java, if the application lacks protection, decompiling it reveals the original source code.
Using JADX (a Java decompiler), the attacker quickly finds that the application is not obfuscated, making it easy to understand the communication protocol used to send commands to the fireworks system.

Decompiled Java code of the mobile app with Jadx, Hacking a WiFi Fireworks Firing System – The FireFly Plus, Matt Brown , July 5 2024

Exploiting the security weakness

With access to the command structure, the attacker can craft and send malicious commands to any firework device that still uses the default password.
This allows the attacker to ignite fireworks remotely, posing a serious safety risk.

Key security lessons from this attack:

  • Disable serial console access – Ensure UART access is disabled in the operating system to prevent unauthorized shell access.
  • Enforce unique passwords – Avoid using the same default credentials across all devices.
  • Do not log sensitive information – System logs should never expose WiFi credentials or other security-critical data.
  • Encrypt & authenticate all communications – Prevent MITM attacks by using strong encryption and authentication mechanisms.
  • Protect mobile applications – Obfuscate Android apps to prevent easy reverse engineering, which could reveal how network protocols operate.
  • Firmware security matters, but so do apps – Attackers often seek the easiest path to exploit a system. If the mobile app is unprotected, it may provide a faster way to break into the system than firmware analysis.

By implementing these security measures, the risk of unauthorized access and remote exploitation of fireworks control systems can be significantly reduced.

Attack scenario 2: VStarcam CB73 Security Camera

Source : vstarcam.com

VStarcam CB73 is a Chinese security camera for homes, selling below 30 €.
Security researcher Matt Brown presents the attack steps to gain full root access to the device in this video. [2].

The attacker gains access to the camera’s internal hardware by opening its casing and identifying four test pads on the printed circuit board (PCB).
By consulting the processor’s datasheet, the attacker determines that these test pads correspond to UART serial communication pins.

4 test pads, Discovering a Hardcoded Root Password – Hacking the VStarcam CB73 Security Camera, Matt Brown, July 24 2024

Gaining terminal access

Using a serial cable, the attacker connects these pads to a computer, obtaining access to the device’s terminal. However, the shell prompts for a login and password.
While examining the console logs, the attacker notices that the device uses U-Boot (a common bootloader).
During boot, holding the “Enter” key interrupts the process, opening the boot menu.
By running printenv, the attacker inspects the boot arguments (“bootargs”) and modifies them to boot directly into a shell (/bin/sh) using:
setenv bootargs console=ttyS1,115200n8 root=/dev/mtdblock2 init=/bin/sh
Executing the boot command then relaunches the boot sequence, granting access to a restricted shell.

Escalating privileges

To bypass these restrictions, the attacker examines the device’s initialization scripts (/etc/init.d/rcS).
By running specific Linux commands, the attacker escalates to a fully functional shell with access to the file system.

Discovering a Hardcoded Root Password – Hacking the VStarcam CB73 Security Camera, Matt Brown, July 24 2024

Upon inspecting the passwd file (/etc/passwd), the attacker discovers a user account:

vstarcam2017:<hashed password>

Discovering a Hardcoded Root Password – Hacking the VStarcam CB73 Security Camera, Matt Brown, July 24 2024

Using Hashcat, a password-cracking tool, fails to decrypt the hash.

Recovering the hardcoded password

Searching for occurrences of “passwd” within the filesystem reveals that a binary named “encoder” writes to /etc/passwd.

Discovering a Hardcoded Root Password – Hacking the VStarcam CB73 Security Camera, Matt Brown, July 24 2024

Disassembling this binary using Ghidra (a free reverse engineering tool) reveals that it contains a hardcoded password:

20170912

After rebooting the device, the attacker successfully logs in using:

  • Username: vstarcam2017
  • Password: 20170912

This grants root shell access, providing full control over the camera.

Key security lessons from this attack

  • Disable serial console access – Prevent unauthorized shell access via UART.
  • Secure the boot menu – Restrict access to U-Boot to prevent attackers from modifying boot arguments and audit the configuration from an audit security lab. [Check out QLab]
  • Protect sensitive programs – Use binary obfuscation to make reverse engineering more complex.
  • Enforce strong & unique passwords – Avoid using hardcoded credentials and ensure each device has a unique password.

By implementing these security measures, the risk of unauthorized access and device compromise can be significantly reduced.

Attack scenario 3: Wyze cam v2 camera

Source: wyze.com

Wyze cam cameras are affordable surveillance cameras for homes, selling for around 25€.
In this video, security researcher Stacksmashing presents the attack steps needed to modify the camera’s firmware and inject a backdoor [3].

The attacker begins by downloading the camera’s firmware directly from the manufacturer’s website, as no authentication or registration is required.

Extracting and cracking password hashes

Using standard Linux tools such as binwalk, the attacker unpacks the firmware and locates the Linux shadow file, which contains password hashes.
By running the John the Ripper password-cracking tool, the attacker quickly retrieves the plaintext password.

Injecting a backdoor into the firmware

After gaining access to the firmware’s file system, the attacker modifies key system files (e.g., /etc/init.d/rcS) to integrate a backdoor.

/etc/init/rcS script, IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade, stacksmashing, January 13 2020

This backdoor enables the camera to call back a command-and-control (C2) server, allowing the attacker to remotely control the device.

Deploying the malicious firmware

The attacker then repackages the modified firmware using standard Linux tools and installs it on the camera via the official upgrade process.
Since the manufacturer does not verify firmware integrity or authenticity, the device accepts the modified firmware without issue.

Achieving full remote access

With the backdoor in place, the attacker can now connect to the camera remotely via the C2 server.
This access allows them to:

  • Monitor video feeds in real-time
  • Modify device settings
  • Move laterally into the internal network

For example, the attacker could sell the compromised camera second-hand, gaining persistent access to the buyer’s home or corporate network.

Key security lessons from this attack

  • Use strong passwords – Weak passwords enable attackers to crack hashes and gain access.
  • Encrypt & obfuscate firmware – Prevent easy analysis and modifications by attackers.
  • Implement firmware integrity checks – Ensure only authentic firmware can be installed.
  • Require authentication for firmware downloads – Restrict access to prevent attackers from analyzing and modifying the firmware.

By enforcing strong cryptographic protections and strict authentication measures, manufacturers can prevent unauthorized firmware modifications and secure IoT devices against remote takeovers.

Conclusion

These three attacks illustrate how an attacker can achieve full administrative access to IoT devices using only basic tools, such as a serial cable, standard Linux utilities, and free reverse engineering software. 

In the final scenario, the attacker goes a step further by modifying the firmware to implant malicious code, enabling persistent remote control of the device. This situation underscores the urgent need for stronger security measures in embedded systems to prevent unauthorized access and firmware manipulation.

Our audit and consulting team, QLab, made up of expert security engineers and researchers, can perform security audits on devices and software to help you spot vulnerabilities.

QShield, a comprehensive suite of security solutions, can help you protect firmware and applications with obfuscation, anti-tampering, and Runtime Application Self Protection RASP.

Get in touch to learn more.

References

[1] Hacking a WiFi Fireworks Firing System – The FireFly Plus, Matt Brown https://www.youtube.com/watch?v=gHu3upXJT0U

[2] Discovering a Hardcoded Root Password – Hacking the VStarcam CB73 Security Camera, Matt Brown https://www.youtube.com/watch?v=lbSalKp_ldA

[3] IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade, stacksmashing https://www.youtube.com/watch?v=hV8W4o-Mu2o

Watch our webinar

Webinar replay

IoT Security Essentials
Follow us