News

Abusing Belkin Home Automation Devices

In 2013 and 2014 several high profile vulnerabilities were found in Belkin's WeMo line of home automation devices. Belkin not only patched most of those vulnerabilities, but also maintains a very regular update cycle, which makes them one of the more responsive players in the IoT space. Therefore, we thought it would be interesting to revisit this line of IoT products to see how we could break or abuse them. What we found are multiple vulnerabilities in both the device and the Android app that can be used to obtain a root shell on the device, run arbitrary code on the phone paired with the device, deny service to the device, and launch DoS attacks without rooting the device.

This talk will walk through the details of heap overflow, SQL injection, and code injection zero days, as well as their associated exploits. It will also introduce a new technique for achieving code execution via SQL injection into a SQLite database on an embedded device. Moreover, a demonstration of rooting a WeMo device and injecting code into the WeMo Android app from a WeMo device will also be conducted.






Abusing Belkin Home Automation Devices Reviewed by Ali Dharani on 11:39 PM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: ehacking.net © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form

Name

Email *

Message *

Powered by Blogger.