{"id":27027,"date":"2019-04-26T20:14:00","date_gmt":"2019-04-26T20:14:00","guid":{"rendered":"http:\/\/0dddc8ad-0e73-4f8a-9f3f-dc0703eda135"},"modified":"2019-04-26T20:14:00","modified_gmt":"2019-04-26T20:14:00","slug":"over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/","title":{"rendered":"Over two million IoT devices vulnerable because of P2P component flaws"},"content":{"rendered":"<p><a rel=\"nofollow\" href=\"https:\/\/www.zdnet.com\/article\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#modal-absolute-d5f04fa0-0a4f-4382-92a6-4e5f19a51317\" data-open=\"modal\"><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/04\/26\/d5f04fa0-0a4f-4382-92a6-4e5f19a51317\/9878444ea783432325607d584d2fbdc4\/hichip-camera-with-uid.png\" class alt=\"hichip-camera-with-uid.png\"><\/span><\/a><span class=\"credit\">Image: Paul Marrapese<\/span><\/p>\n<div class=\"modal infographic\" id=\"modal-absolute-d5f04fa0-0a4f-4382-92a6-4e5f19a51317\">\n<div class=\"modal-body\"><span class=\"img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/04\/26\/d5f04fa0-0a4f-4382-92a6-4e5f19a51317\/resize\/1170x878\/4ae7d5c03d3ae0746c3b85baee0e7564\/hichip-camera-with-uid.png\" class alt height=\"878\" width=\"1170\"><\/span><\/div>\n<\/div>\n<p>More than two million IoT devices, possibly more, are using a vulnerable P2P firmware component that allows hackers to locate and take over impacted systems.<\/p>\n<p>Vulnerable devices include IP cameras, baby monitors, smart doorbells, DVRs, and many others, manufactured and sold by multiple vendors under hundreds of brands, such as HiChip, TENVIS, SV3C, VStarcam, Wanscam, NEO Coolcam, Sricam, Eye Sight, and HVCAM, just to name a few.<\/p>\n<p>What all these devices have in common is that they use iLnkP2P, a firmware component that allows the device to talk to vendors&#8217; servers via the P2P (peer-to-peer) protocol.<\/p>\n<p>Earlier this year, security researcher Paul Marrapese discovered two vulnerabilities in this component &#8211;tracked under the CVE-2019-11219 and CVE-2019-11220 identifiers.<\/p>\n<p>According to Marrapese, the first &#8220;allows attackers to rapidly discover devices that are online,&#8221; while the second &#8220;allows attackers to intercept connections to devices and perform man-in-the-middle attacks&#8221; and &#8220;to steal the password to a device and take control of it.&#8221;<\/p>\n<h3>Component maker did not respond to security researcher<\/h3>\n<p>The researcher says that the vulnerable component&#8217;s maker &#8211;Chinese company Shenzhen Yunni Technology Company, Inc&#8211; did not reply to emails notifying the company about the two security flaws.<\/p>\n<p>Attempts to contact the vendor through the CERT Coordination Center (CERT\/CC) at the Carnegie Mellon University and China&#8217;s national Computer Emergency Response Team (CN-CERT) had also failed.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;I strongly recommend anyone dispose of vulnerable devices, but only if they cannot, they should block OUTBOUND traffic to 32100\/udp,&#8221; the researcher told ZDNet in an email.<\/p>\n<p>Blocking traffic on UDP port 32100 will prevent attackers and botnets from exploiting the vulnerabilities remotely, although devices will remain vulnerable to exploitation attempts from the local network, but the researcher considers this a more acceptable risk.<\/p>\n<h3>How to spot a vulnerable device<\/h3>\n<p>Since there are hundreds of device brands that may use the iLnkP2P component in their firmware, on a <a href=\"https:\/\/hacked.camera\/\" target=\"_blank\" rel=\"noopener noreferrer\">website<\/a> the researcher published this week, he listed two methods that device owners can use and see if their device might be impacted.<\/p>\n<p>&#8220;Devices that use the following Android apps may be vulnerable,&#8221; the researcher said:<\/p>\n<ul>\n<li><strong>HiChip<\/strong>: CamHi, P2PWIFICAM, iMega Cam, WEBVISION, P2PIPCamHi, IPCAM P<\/li>\n<li><strong>VStarcam<\/strong>: Eye4, EyeCloud, VSCAM, PnPCam<\/li>\n<li><strong>Wanscam<\/strong>: E View7<\/li>\n<li><strong>NEO<\/strong>: P2PIPCAM, COOLCAMOP<\/li>\n<li><strong>Sricam<\/strong>: APCamera<\/li>\n<li><strong>Various<\/strong>: P2PCam_HD<\/li>\n<\/ul>\n<p>In addition, devices that have a UID identifier listed on their labels in the format of &#8220;XXXX-123456-ABCDE,&#8221; where XXXX is one of the following codes, are also impacted:<\/p>\n<table id=\"prefixes\">\n<tbody>\n<tr>\n<td>AID<\/td>\n<td>AJT<\/td>\n<td>AVA<\/td>\n<td>BSIP<\/td>\n<td>CAM<\/td>\n<\/tr>\n<tr>\n<td>CPTCAM<\/td>\n<td>CTW<\/td>\n<td>DFT<\/td>\n<td>DFZ<\/td>\n<td>DYNE<\/td>\n<\/tr>\n<tr>\n<td>EEEE<\/td>\n<td>ELSA<\/td>\n<td>ESN<\/td>\n<td>ESS<\/td>\n<td>EST<\/td>\n<\/tr>\n<tr>\n<td>FFFF<\/td>\n<td>GCMN<\/td>\n<td>GGGG<\/td>\n<td>GKW<\/td>\n<td>HDT<\/td>\n<\/tr>\n<tr>\n<td>HHHH<\/td>\n<td>HRXJ<\/td>\n<td>HVC<\/td>\n<td>HWAA<\/td>\n<td>HZD<\/td>\n<\/tr>\n<tr>\n<td>HZDA<\/td>\n<td>HZDB<\/td>\n<td>HZDC<\/td>\n<td>HZDN<\/td>\n<td>HZDX<\/td>\n<\/tr>\n<tr>\n<td>HZDY<\/td>\n<td>HZDZ<\/td>\n<td>IIII<\/td>\n<td>IPC<\/td>\n<td>ISRP<\/td>\n<\/tr>\n<tr>\n<td>JWEV<\/td>\n<td>KSC<\/td>\n<td>MCI<\/td>\n<td>MCIHD<\/td>\n<td>MDI<\/td>\n<\/tr>\n<tr>\n<td>MDIHD<\/td>\n<td>MEG<\/td>\n<td>MEYE<\/td>\n<td>MGA<\/td>\n<td>MGW<\/td>\n<\/tr>\n<tr>\n<td>MIC<\/td>\n<td>MICHD<\/td>\n<td>MMMM<\/td>\n<td>MSE<\/td>\n<td>MSEHD<\/td>\n<\/tr>\n<tr>\n<td>MSI<\/td>\n<td>MSIHD<\/td>\n<td>MTE<\/td>\n<td>MTEHD<\/td>\n<td>MUI<\/td>\n<\/tr>\n<tr>\n<td>MUIHD<\/td>\n<td>NIP<\/td>\n<td>NIPHD<\/td>\n<td>NPC<\/td>\n<td>NTP<\/td>\n<\/tr>\n<tr>\n<td>OBJ<\/td>\n<td>OPCS<\/td>\n<td>OPMS<\/td>\n<td>PAR<\/td>\n<td>PARC<\/td>\n<\/tr>\n<tr>\n<td>PCS<\/td>\n<td>PHP<\/td>\n<td>PIO<\/td>\n<td>PIPCAM<\/td>\n<td>PIX<\/td>\n<\/tr>\n<tr>\n<td>PNP<\/td>\n<td>PSD<\/td>\n<td>PTP<\/td>\n<td>QHSV<\/td>\n<td>ROSS<\/td>\n<\/tr>\n<tr>\n<td>SID<\/td>\n<td>SIP<\/td>\n<td>SXH<\/td>\n<td>TIO<\/td>\n<td>TSD<\/td>\n<\/tr>\n<tr>\n<td>UID<\/td>\n<td>VIO<\/td>\n<td>VSTD<\/td>\n<td>VSTF<\/td>\n<td>WBT<\/td>\n<\/tr>\n<tr>\n<td>WBTHD<\/td>\n<td>WNS<\/td>\n<td>WNSC<\/td>\n<td>WXH<\/td>\n<td>WXO<\/td>\n<\/tr>\n<tr>\n<td>XDBL<\/td>\n<td>XTST<\/td>\n<td>ZES<\/td>\n<td>ZLD<\/td>\n<td>ZSKJ<\/td>\n<\/tr>\n<tr>\n<td>ZZZZ<\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The researcher&#8217;s discovery isn&#8217;t an isolated case. Back in October, cyber-security firm SEC Consult found similar flaws in devices manufactured by another Chinese company, which were similarly sold as white-label devices and rebranded by tens of other companies. In total, <a href=\"https:\/\/www.zdnet.com\/article\/over-nine-million-cameras-and-dvrs-open-to-apts-botnet-herders-and-voyeurs\/\" target=\"_blank\">over nine million<\/a> security cameras, DVRs, and NVRs were believed to be impacted by those flaws.<\/p>\n<h3>More vulnerability reports:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Devices like IP cameras, smart doorbells, and baby monitors sold under hundreds of brands are impacted.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27028,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-27027","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Over two million IoT devices vulnerable because of P2P component flaws 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Over two million IoT devices vulnerable because of P2P component flaws 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-26T20:14:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png\" \/>\n\t<meta property=\"og:image:width\" content=\"952\" \/>\n\t<meta property=\"og:image:height\" content=\"552\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Over two million IoT devices vulnerable because of P2P component flaws\",\"datePublished\":\"2019-04-26T20:14:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/\",\"name\":\"Over two million IoT devices vulnerable because of P2P component flaws 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png\",\"datePublished\":\"2019-04-26T20:14:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png\",\"width\":952,\"height\":552},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Over two million IoT devices vulnerable because of P2P component flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Over two million IoT devices vulnerable because of P2P component flaws 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Over two million IoT devices vulnerable because of P2P component flaws 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-26T20:14:00+00:00","og_image":[{"width":952,"height":552,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Over two million IoT devices vulnerable because of P2P component flaws","datePublished":"2019-04-26T20:14:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/"},"wordCount":586,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/","url":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/","name":"Over two million IoT devices vulnerable because of P2P component flaws 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png","datePublished":"2019-04-26T20:14:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws.png","width":952,"height":552},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/over-two-million-iot-devices-vulnerable-because-of-p2p-component-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Over two million IoT devices vulnerable because of P2P component flaws"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27027"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27027\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27028"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}