Programmer Discovers His Smart Vacuum Was Spying on Him

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

A programmer discovered his ILIFE A11 smart vacuum was sending unencrypted data including Wi-Fi credentials and home maps to manufacturer servers. When he blocked the data transmission, the device was remotely bricked by the manufacturer. After disassembling it and accessing its unprotected Android Debug Bridge, he found the manufacturer had root access via pre-installed software. The same hardware powers devices from multiple brands including Xiaomi and Wyze, suggesting widespread vulnerability. He successfully restored the device with full local control by removing manufacturer access.

4m read timeFrom 80.lv
Post cover image
11 Comments

Sort: