Check Point Research recently discovered severe vulnerabilities in Smart Light Bulbs operated over the Zigbee IoT radio protocol. For more information visit, …

source

12 thoughts on “Hacking Smart Light Bulbs | Latest Research from Check Point”

  1. What if you use a completely isolated router and phone? In other words, a router that is isolated and not connected to the network; only powered on and secured in conjunction with a spare phone that isn't connected to your real Gmail account.

  2. I’m assuming this is some sort of Windows 7 SP1 Eternal Blue exploit, built into a python script mimicking a “available” lightbulb. Also, I believe it requires you to send a deauth packet to a bulbs specific MAC address. Pretty cool concept, but not as effective, if the hub doesn’t maintain exploited firmware.

Leave a Reply to Spencer Simons Cancel reply

Your email address will not be published. Required fields are marked *