1 Million Imperial & Dabman IoT Radio Devices Vulnerable to Attacks
CYBER NEWS

1 Million Imperial & Dabman IoT Radio Devices Vulnerable to Attacks

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

Dangerous vulnerabilities were recently discovered in Telestar Digital GmbH IoT radio devices. The flaws could allow remote attackers to hijack vulnerable systems.




The vulnerabilities were discovered by Vulnerability Laboratory. Some of them are already assigned CVE numbers – CVE-2019-13473 and CVE-2019-13474. The vulnerable devices are web radios “Dabman & Imperial” (series i & d) which are distributed in Germany by Telestar Digital GmbH. The devices utilize Bluetooth and Internet connectivity, and are based on BusyBox Linux Debian.

Related: Here’s How Easy It Is to Hack and Exploit a Smart Coffee Maker

How were the vulnerabilities discovered?

Vulnerability Laboratory came across an anomaly on a private server which was stemming from web radio terminals of Telestar devices. As explained by security researcher Benjamin Kunz, during the investigation they noticed an undocumented Telnet service on the standard port 23 on these end devices during a port scan.

Since port forwarding was activated for all ports on this network, it could be addressed from the outside. Telnet services are less used today, because content is transmitted unencrypted and there are better alternatives today. Nevertheless, the protocol on network level and in end devices is still a bigger topic than originally thought, the researcher explained.

The researchers were able to connect and brute-force one of the radios. The attack granted them root access with full privileges. Other attacks that can be performed against the devices include changing device names, forcing a play stream, saving audio files as messages, and transmitting audio as commands locally and remotely.

More than 1 million devices may be at risk of attacks.

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...