Watchful IP

45 posts

Watchful IP banner
Watchful IP

Watchful IP

@Watchful_IP

Security researching in the middle of the night. Focusing on ARM based embedded IoT

Katılım Ağustos 2021
5 Takip Edilen405 Takipçiler
Sabitlenmiş Tweet
Watchful IP
Watchful IP@Watchful_IP·
Zyxel DX3301-T0/EX3301-T0 Router Post Auth Vulnerability for root shell. Bootloader vulnerability for full debug commands access. General Notes #infosec #zyxel #iot watchfulip.github.io
Watchful IP tweet media
English
0
0
0
168
Victor Fresk0
Victor Fresk0@hacefresko·
Zyxel has published 2 CVEs for some vulns I found :D CVE-2025-13943: Authenticated command injection in log export CGI CVE-2025-13942: Unauthenticated command injection in UPnP daemon I will blog about this in the coming months. Meanwhile, exploits here: github.com/hacefresko/CVEs
English
1
15
44
2.6K
Watchful IP
Watchful IP@Watchful_IP·
@WeldPond There are of course exceptions. Should it work this way? Probably not - but at the same time security researchers spend many hours finding a vulnerability or doing contracted security testing and have to earn a living. Anything important I find I make sure it gets fixed.
English
0
0
0
18
Watchful IP
Watchful IP@Watchful_IP·
@WeldPond In my experience this is usally how it works which is why my disclosure blog stays mostly silent unless it's a personal project or the vendor has a no bug bounty policy. If the vendor does publically disclose at all there is often a tendancy to downplay the impact/severity.
English
1
0
1
65
Watchful IP
Watchful IP@Watchful_IP·
@AIengineerlife @0xor0ne I'm not aware of in the wild exploitation - Zyxel PSIRT were sent my formal report (linked in my blog post) ahead of publication. The FW of other platforms I checked appear to no longer be vulnerable, with one exception they are actively reviewing (not yet confirmed vulnerable).
English
0
0
0
20
The AI generalist
The AI generalist@AIengineerlife·
@0xor0ne @Watchful_IP Post-auth root shell on Zyxel routers is concerning given their deployment in SOHO environments. Has there been any indication of active exploitation? Worth checking if this affects other models in the DX/EX series with similar firmware.
English
1
0
1
258
Watchful IP
Watchful IP@Watchful_IP·
@evilsocket You are more than welcome my friend - as security researchers we all know exactly how fun those rabbit holes can be or what treasures we might find :)
English
0
0
1
20
Simone Margaritelli
Simone Margaritelli@evilsocket·
@Watchful_IP 100% thank you so much for offering such big shoulder to hop on, real fun weekend rabbit hole 🙏
English
1
0
1
40
Simone Margaritelli
Simone Margaritelli@evilsocket·
150 days after initial disclosure, here is the writeup (link in the comments to make the algo happy). TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy in the Era of AI Assisted Reverse Engineering
Simone Margaritelli tweet media
English
6
26
99
12.9K
Watchful IP retweetledi
faulty *ptrrr
faulty *ptrrr@0x_shaq·
For the embedded security enthusiast, here’s a list of resources of vuln researchers inspecting the TP-Link security camera(s): >By @evilsocket : TP-Link Tapo C200: Hardcoded Keys, Buffer Overflows and Privacy in the Era of AI Assisted Reverse Engineering : evilsocket.net/2025/12/18/TP-… >By (me🤓): Exploiting n-day in Home Security Camera: pwner.gg/blog/2024-01-0… >By @Watchful_IP : Link (Tapo) C210 cloud camera: bootloader vulnerability and firmware decryption : watchfulip.github.io/28-12-24/tp-li… >By @two06 : Hacking a Tapo TC60 Camera : @two06/hacking-a-tapo-tc60-camera-e6ce7ca6cad1" target="_blank" rel="nofollow noopener">medium.com/@two06/hacking… >By @drmnsamoliu : Tapo C200 IP camera research project : drmnsamoliu.github.io/index.html
English
2
59
355
35.3K
Watchful IP
Watchful IP@Watchful_IP·
@evilsocket Great research and excellent write up. Glad my own helped out/saved time :)
English
1
0
1
40
Watchful IP
Watchful IP@Watchful_IP·
@kindnessuae @0xor0ne Totally valid point. Unfortunately in many cases if you want to collect a bug bounty you have to sign an NDA/contract which prevents you from publishing or CVE assignment etc. The vast majority of my finds will never therefore be known except to the relevant vendor.
English
0
0
1
61
Jawad Al Hashmi
Jawad Al Hashmi@kindnessuae·
@Watchful_IP @0xor0ne Sharing your findings openly, rather than keeping them in a closed report, really elevates the conversation. This candid approach strengthens the infosec community.
English
1
0
1
46
Watchful IP
Watchful IP@Watchful_IP·
@kindnessuae @0xor0ne Thank you my friend - I appreciate those kind words. This was just a fun personal project for me which meant I didn't have to write a dry confidential formal report that very few people would actually read. Made a nice change to share for once.
English
1
0
0
47
Jawad Al Hashmi
Jawad Al Hashmi@kindnessuae·
@0xor0ne @Watchful_IP Uncovering bootloader gaps and decrypting firmware with UART is no small feat. Acknowledging GPL compliance while revealing real flaws reflects the rigor infosec research demands.
English
1
0
1
536
Watchful IP
Watchful IP@Watchful_IP·
@devwizardoh @0xor0ne Thanks my friend :) When (non tech) people ask what I do, I usually say I try to find the weakness in products on the Internet to get them fixed before the bad guys can use them to hurt people. Bug bounties are of course a nice bonus.
English
0
0
1
27
Oحaddad
Oحaddad@devwizardoh·
@Watchful_IP @0xor0ne Awesome to see you back, @Watchful_IP! Your TP-Link C210 V2 deep dive is pure gold. Can't wait for more insights from you! Let's keep pushing the boundaries of IoT security.
English
1
0
1
37
Watchful IP
Watchful IP@Watchful_IP·
@devwizardoh @0xor0ne Thanks for your kind words :) Haven't been able to share any work for 3 years, but always read @0xor0ne posts, and wanted to share the approaches I took with this one.
English
1
0
0
23
Oحaddad
Oحaddad@devwizardoh·
@0xor0ne @Watchful_IP Great deep dive into TP-Link C210 V2! The root shell access part is gold. Love the thorough ethical approach. Now, who's up for more IoT tinkering?
English
1
0
1
129
Watchful IP
Watchful IP@Watchful_IP·
@AbcXyz03921267 @0xor0ne I thought the way I fixed a corrupted romfs partition was interesting so thought I'd write it up. And overall it was just nice to be able to share something after years of having to be publicly silent. If an RCE I'd have had to follow normal CVD procedure with the vendor.
English
0
0
0
22
Abc Xyz
Abc Xyz@AbcXyz03921267·
@0xor0ne @Watchful_IP This is quality work. I'm just pointing out the market trend with IP cam firmware
English
2
0
1
71
Watchful IP
Watchful IP@Watchful_IP·
@AbcXyz03921267 @0xor0ne No analysis of the network attack surface, or cloud infrastructure was made at all. As this was not contacted testing work, I was just focused on having fun with it. Hopefully the firmware decryption tool I published will be of interest, especially with TP-Link ban in the news.
English
0
0
0
46