The Samsung Smartcam is a great example of why consumers should be weary of ‘Internet of Things’ devices. Multiple exploits for the camera have been found since the Smartcam initially went on sale, previously allowing for remote command execution and changing the admin password without knowing the original one. Now another exploit has been discovered for the Smartcam, this time allowing commands to be executed as the root user.
After the first wave of exploits, the Smartcam’s local web interface was completely removed, only allowing users to connect to it via the Samsung SmartCloud website.
Exploitee.rs hacked the Samsung Smartcam yet again, this time with a root exploit was written by the awesome team at Android Police.