<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Bitdefender Labs</title><description>Daily source of cyber-threat information. Established 2001.</description><link>https://www.bitdefender.com/en-us/blog/labs/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Bitdefender Labs</title><link>https://www.bitdefender.com/en-us/blog/labs/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Mon, 09 Mar 2026 18:05:44 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-us/rss/labs/iot-research/" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>CVE-2025-55182 Exploitation Hits the Smart Home</title><description><![CDATA[Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network sensors. The vulnerability, informally referred to as React2Shell, affects Node.js applications that allow user-supplied JSON data to influence internal JavaScript object structures. When improperly validated, attackers can escalate this into remote command execution through access to process.mainModule.require and, subsequently, child_process.execSync. ]]></description><link>https://www.bitdefender.com/en-us/blog/labs/cve-2025-55182-exploitation-hits-the-smart-home</link><guid isPermaLink="false">6937f928a89a0404d6eab153</guid><category><![CDATA[IoT Research]]></category><dc:creator>Ioan Alexandru MELNICIUC</dc:creator><pubDate>Tue, 09 Dec 2025 09:37:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2025/12/pexels-jakubzerdzicki-19089175.jpg" medium="image"/><content:encoded><![CDATA[Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network sensors. The vulnerability, informally referred to as React2Shell, affects Node.js applications that allow user-supplied JSON data to influence internal JavaScript object structures. When improperly validated, attackers can escalate this into remote command execution through access to process.mainModule.require and, subsequently, child_process.execSync. ]]></content:encoded></item><item><title>Vulnerabilities Identified in Dahua Hero C1 Smart Cameras</title><description><![CDATA[Researchers at Bitdefender have identified critical security vulnerabilities in the firmware of the Dahua Hero C1 (DH-H4C) smart camera series. The flaws, affecting the device's ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device.

The vulnerabilities were reported to Dahua for responsible mitigation and disclosure and are now patched at the time of publication.


Affected Devices

The issues were ver]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-dahua-hero-c1-smart-cameras</link><guid isPermaLink="false">688a2c7495161a04e7e9533a</guid><category><![CDATA[Whitepapers]]></category><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 30 Jul 2025 14:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2025/07/Technology_Background_-_Digital_Hand_Unlocking_Portal-1.jpg" medium="image"/><content:encoded><![CDATA[Researchers at Bitdefender have identified critical security vulnerabilities in the firmware of the Dahua Hero C1 (DH-H4C) smart camera series. The flaws, affecting the device's ONVIF protocol and file upload handlers, allow unauthenticated attackers to execute arbitrary commands remotely, effectively taking over the device.

The vulnerabilities were reported to Dahua for responsible mitigation and disclosure and are now patched at the time of publication.


Affected Devices

The issues were ver]]></content:encoded></item><item><title>60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States</title><description><![CDATA[The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity - is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, like a fish can’t see the ocean.

Until the grid goes down, that is. Then, like the fish dangling from the angler’s hook, we see our vulnerability. Modernity dissolves into a sudden silence, followed by the repeated flick of a light switch, and a howl of panic at the prospect of missed appointmen]]></description><link>https://www.bitdefender.com/en-us/blog/labs/60-hurts-per-second-how-we-got-access-to-enough-solar-power-to-run-the-united-states</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722d2</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Ioan Alexandru MELNICIUC</dc:creator><pubDate>Wed, 07 Aug 2024 13:16:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/08/1ZZ96uESRJQ.jpg" medium="image"/><content:encoded><![CDATA[The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity - is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, like a fish can’t see the ocean.

Until the grid goes down, that is. Then, like the fish dangling from the angler’s hook, we see our vulnerability. Modernity dissolves into a sudden silence, followed by the repeated flick of a light switch, and a howl of panic at the prospect of missed appointmen]]></content:encoded></item><item><title>Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem</title><description><![CDATA[Since 2014, Bitdefender IoT researchers have been looking into the world's most popular IoT devices, hunting for vulnerabilities and undocumented attack avenues. This report documents four vulnerabilities affecting devices powered by the ThroughTek Kalay Platform. Due to the platform’s massive presence in IoT integrations, these flaws have a significant downstream impact on several vendors.

In the interconnected landscape of the Internet of Things (IoT), the reliability and security of devices,]]></description><link>https://www.bitdefender.com/en-us/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722cf</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 15 May 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/05/computer-8037837_1920.jpg" medium="image"/><content:encoded><![CDATA[Since 2014, Bitdefender IoT researchers have been looking into the world's most popular IoT devices, hunting for vulnerabilities and undocumented attack avenues. This report documents four vulnerabilities affecting devices powered by the ThroughTek Kalay Platform. Due to the platform’s massive presence in IoT integrations, these flaws have a significant downstream impact on several vendors.

In the interconnected landscape of the Internet of Things (IoT), the reliability and security of devices,]]></content:encoded></item><item><title>Vulnerabilities Identified in LG WebOS</title><description><![CDATA[As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers vulnerabilities discovered while researching the LG WebOS TV operating system.

We have found several issues affecting WebOS versions 4 through 7 running on LG TVs. These vulnerabilities let us gain root acces]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-lg-webos</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722ce</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 09 Apr 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/04/web-4869856_1920.jpg" medium="image"/><content:encoded><![CDATA[As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers vulnerabilities discovered while researching the LG WebOS TV operating system.

We have found several issues affecting WebOS versions 4 through 7 running on LG TVs. These vulnerabilities let us gain root acces]]></content:encoded></item><item><title>Vulnerabilities identified in Bosch BCC100 Thermostat</title><description><![CDATA[Several factors underscore the importance of smart thermostats: energy efficiency, environmental sustainability, and the spread of smart home technologies. These devices have a major impact on energy conservation and its associated cost savings, while making homes noticeably more comfortable.

This combination of energy efficiency, convenience and environmental consciousness, which resonate with the current priorities of individuals, governments and societies, have led to the diversification of ]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-bosch-bcc100-thermostat</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c5</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Thu, 11 Jan 2024 14:26:30 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/01/technology-gbbc352657_1920.jpg" medium="image"/><content:encoded><![CDATA[Several factors underscore the importance of smart thermostats: energy efficiency, environmental sustainability, and the spread of smart home technologies. These devices have a major impact on energy conservation and its associated cost savings, while making homes noticeably more comfortable.

This combination of energy efficiency, convenience and environmental consciousness, which resonate with the current priorities of individuals, governments and societies, have led to the diversification of ]]></content:encoded></item><item><title>Vulnerabilities identified in
Amazon Fire TV Stick, Insignia
FireOS TV Series</title><description><![CDATA[Streaming devices have become increasingly popular in recent years, and for good reason. Portable, frequently updated and relatively inexpensive when compared to a new smart TV, these devices offer a convenient, cost-effective, and customizable way to access a vast selection of content from the comfort of your own home. Smart TVs and streaming devices account for a whopping 20% [pdf] of all connected IoT devices, and potential vulnerabilities in firmware could affect a significant user base.

As]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722b9</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 02 May 2023 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2023/05/old-tv-gab6450206_1920.png" medium="image"/><content:encoded><![CDATA[Streaming devices have become increasingly popular in recent years, and for good reason. Portable, frequently updated and relatively inexpensive when compared to a new smart TV, these devices offer a convenient, cost-effective, and customizable way to access a vast selection of content from the comfort of your own home. Smart TVs and streaming devices account for a whopping 20% [pdf] of all connected IoT devices, and potential vulnerabilities in firmware could affect a significant user base.

As]]></content:encoded></item><item><title>Vulnerabilities Identified in EZVIZ Smart Cams</title><description><![CDATA[As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers several camera models manufactured by EZVIZ. Full details are included in the research paper below:

Download the research paper


Vulnerabilities at a glance

 ]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722ac</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Thu, 15 Sep 2022 13:05:28 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/09/technology-gbbc352657_1920.jpg" medium="image"/><content:encoded><![CDATA[As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers several camera models manufactured by EZVIZ. Full details are included in the research paper below:

Download the research paper


Vulnerabilities at a glance

 ]]></content:encoded></item><item><title>Vulnerabilities Identified in Eufy
2K Indoor Camera</title><description><![CDATA[At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT device manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in th]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-eufy2k-indoor-camera</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722a7</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 31 May 2022 09:03:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/05/iot-device-management.jpg" medium="image"/><content:encoded><![CDATA[At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT device manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in th]]></content:encoded></item><item><title>Vulnerabilities Identified in Neos SmartCam IoT Device</title><description><![CDATA[Foreword

Connected IP cameras are ubiquitous. Always connected and readily available from outside of the home, they are the go-to surveillance device. But their constant connection to their cloud means they can be found and hijacked, if vulnerable.

As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program and aims to she]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-neos-smartcam-iot-device</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722a5</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Fri, 22 Apr 2022 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/04/home-automation-6105061_1920.png" medium="image"/><content:encoded><![CDATA[Foreword

Connected IP cameras are ubiquitous. Always connected and readily available from outside of the home, they are the go-to surveillance device. But their constant connection to their cloud means they can be found and hijacked, if vulnerable.

As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities that might affect customers if left unaddressed. This research paper is part of a broader program and aims to she]]></content:encoded></item><item><title>Vulnerability Identified in the
Kwikset Halo Smart Lock</title><description><![CDATA[Connected security devices play an important role in the ecosystem of the modern home. They help residents keep an eye on who’s on or near the premises, track temperature and humidity, and, in general, monitor what’s going on at home when they’re not around. As these devices are packed with digital “eyes” and other sensors, vulnerabilities and logic flaws can leave them under the control of cybercriminals who turn them into espionage tools.

As the creator of the world’s first smart-home cyberse]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerability-identified-in-kwikset-halo-smart-lock</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722a3</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 06 Apr 2022 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/04/key-gf6d189425_1920.jpg" medium="image"/><content:encoded><![CDATA[Connected security devices play an important role in the ecosystem of the modern home. They help residents keep an eye on who’s on or near the premises, track temperature and humidity, and, in general, monitor what’s going on at home when they’re not around. As these devices are packed with digital “eyes” and other sensors, vulnerabilities and logic flaws can leave them under the control of cybercriminals who turn them into espionage tools.

As the creator of the world’s first smart-home cyberse]]></content:encoded></item><item><title>Vulnerabilities Identified in Wyze Cam IoT Device</title><description><![CDATA[At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT devices manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As a leading vendor of cybersecurity protection across endpoint and IoT devices, we have been assessing the security of smart-home equipment for more than half a decade. Our goal is to help vendors and customers stay on top of security and privacy blind spots and make the IoT ecosystem safer for everybody]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-wyze-cam-iot-device</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722a2</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 29 Mar 2022 13:03:20 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/03/smart-home-gfd3bc417c_1920.jpg" medium="image"/><content:encoded><![CDATA[At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT devices manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As a leading vendor of cybersecurity protection across endpoint and IoT devices, we have been assessing the security of smart-home equipment for more than half a decade. Our goal is to help vendors and customers stay on top of security and privacy blind spots and make the IoT ecosystem safer for everybody]]></content:encoded></item><item><title>Vulnerabilities Identified in Nooie Baby Monitor</title><description><![CDATA[At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT devices manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As one of the leading vendors of cybersecurity protection across endpoint and IoT devices, we have been assessing the security of smart-home equipment for more than half a decade. Our goal is to help vendors and customers stay on top of security and privacy blind spots and make the IoT ecosystem safer for]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-nooie-baby-monitor</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722a1</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Fri, 04 Feb 2022 09:53:47 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2022/02/Abstract_Background_-_Purple_Geometric_Network.jpg" medium="image"/><content:encoded><![CDATA[At Bitdefender, we care deeply about security, so we’ve been working with media partners and IoT devices manufacturers to identify vulnerabilities in the world’s best-selling connected devices. As one of the leading vendors of cybersecurity protection across endpoint and IoT devices, we have been assessing the security of smart-home equipment for more than half a decade. Our goal is to help vendors and customers stay on top of security and privacy blind spots and make the IoT ecosystem safer for]]></content:encoded></item><item><title>Vulnerabilities identified in the
Abode IOTA security system:
Fake image injection
into timeline</title><description><![CDATA[Connected security devices play an important role in the ecosystem of the modern home. They help residents keep an eye on who’s on or near the premises, track temperature and humidity and, in general, monitor what’s going on at home when they’re not around. As these devices are packed with digital “eyes” and other sensors, vulnerabilities and logic flaws can leave them under the control of cybercriminals and turn them into espionage tools.

Our research on the Abode iota All-In-One Security Kit ]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-theabode-iota-security-system-fake-image-injectioninto-timeline</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d7229e</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Mon, 20 Dec 2021 15:34:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2021/12/smart-3720021.jpg" medium="image"/><content:encoded><![CDATA[Connected security devices play an important role in the ecosystem of the modern home. They help residents keep an eye on who’s on or near the premises, track temperature and humidity and, in general, monitor what’s going on at home when they’re not around. As these devices are packed with digital “eyes” and other sensors, vulnerabilities and logic flaws can leave them under the control of cybercriminals and turn them into espionage tools.

Our research on the Abode iota All-In-One Security Kit ]]></content:encoded></item><item><title>Cracking the Victure PC420 Camera and IPC360 Platform - RCE, Unauthorized Streaming and More</title><description><![CDATA[Baby monitors have become essential tools for keeping an eye on kids and nannies when away. Most cameras on the market are packed with features, ranging from real-time or motion-detection recording to two-way communication and anything in between. As households get increasingly interconnected and crammed with video and audio sensors, privacy becomes more important than ever.

While looking into the Victure IPC360 Camera, we have identified several vulnerabilities that allow an outside attacker t]]></description><link>https://www.bitdefender.com/en-us/blog/labs/cracking-the-victure-pc420-camera</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d72299</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Mon, 30 Aug 2021 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2021/08/smart-home-4153906_1920.jpg" medium="image"/><content:encoded><![CDATA[Baby monitors have become essential tools for keeping an eye on kids and nannies when away. Most cameras on the market are packed with features, ranging from real-time or motion-detection recording to two-way communication and anything in between. As households get increasingly interconnected and crammed with video and audio sensors, privacy becomes more important than ever.

While looking into the Victure IPC360 Camera, we have identified several vulnerabilities that allow an outside attacker t]]></content:encoded></item></channel>
        </rss>