Get a Pentest and security assessment of your IT network.

Cyber Security

STEM Audio Table Rife with Business-Threatening Bugs

STEM Audio Table conference-room speaker has a security vulnerability that would allow unauthenticated remote code execution (RCE) as root on the device. GRIMM researchers found a stack-based buffer overflow issue, located in the local_server_get() and sip_config s() in stem_firmware_linux_2.0.0 function. Another security hole would allow command injection and the ability to execute arbitrary code as root. The device is a high-end, nine-speaker smart device that sits on a conference table to enable whole-room conferencing.

Source: https://threatpost.com/stem-audio-table-business-bugs/166798/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security