emerglines Posted August 23, 2013 Share Posted August 23, 2013 (edited) A few months back, I reported several issues to Loftek regarding their Nexus 543 IP camera, and I eventually received the following response:Dear Craig Young,Thanks for your message. Your suggestion already submit to our Tech department , they are seeking for solution. We highly appreciated for your concern and support. Actually almost more then half of IP Camera in the market are used the same project as ours . And It will a little bit long time to upgrade the product. If don’t set up the camera for WAN view , it will reduce the risk. And our camera just for average household user, not suitable for highly classified occasion . Hope you can understand. ThanksBest RegardsLoftekAfter 10 weeks, I wrote to Loftek again asking for a timeline on when an updated firmware would be released and received this quite unsatisfactory response:Dear Craig Young,We release a Tool “Set DDNS” on our website , with this tool you can remove the camera DDNS . And if you don’t set up the camera for WAN View , remote unauthenticated attacker can’t make a request to access your camera. ThanksHope this can help for youBest RegardsLoftekBased upon this response, I have decided that it is an appropriate time for full disclosure. I’m sure many of these vulnerabilities look familiar, and are familiar to some of you, but this is a popular camera on eBay and Amazon and I have not seen any other reports on this brand/model.More read here (source) Edited August 23, 2013 by 7h3Pr3d47oR Edit title/minuscule Link to comment Share on other sites More sharing options...
Recommended Posts