A security researcher using the name someLuser recently uncovered several security flaws in digital video recorders (DVRs) used for security cameras and CCTV systems.

As Rapid7 CSO HD Moore later explained in an analysis of the flaws, "The vulnerabilities allow for unauthenticated access to the device configuration, which includes the clear-text usernames and passwords that, once obtained, can be used to execute arbitrary system commands root through a secondary flaw in the web interface."

"[Moore] has discovered that 58,000 of the hackable video boxes, all of which use firmware provided by the Guangdong, China-based firm Ray Sharp, are accessible via the Internet," writes Forbes' Andy Greenberg. "'The DVR gives you access to all their video, current and archived,' says Moore. 'You could look at videos, pause and play, or just turn off the cameras and rob the store.'"


"In addition to Ray Sharp, the exposures seem to affect rebranded DVR products by Swann, Lorex, URMET, KGuard, Defender, DEAPA/DSP Cop, SVAT, Zmodo, BCS, Bolide, EyeForce, Atlantis, Protectron, Greatek, Soyo, Hi-View, Cosmos, and J2000," Moore noted.

"The flaws have only been tested through a scan of their code, not actual spying, but Rapid7 is confident it would work on all listed companies' cameras," writes Gizmodo's Kyle Wagner. "Anyone with a system made by one of those companies would have to wait for a firmware update to come out addressing the flaw."