Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Planned obsolescence is definitely a problem for the smart home, dumb equivalents should last decades meanwhile the ‘smart’ version gets abandoned after a few years
This is one of the fundamental terminal problems with the tech industry, and almost nobody but some European governments feel even slightly motivated to act to regulate this slow-motion nightmare.
 
Maybe not fixing bugs is part of their sales strategy. Maybe the large appliance makers ( like refrigerators etc. ) will adopt the same strategy as internet is implemented in their products. Just a reminder that IoT can have additional costs beyond the purchase. Another industry taking advantage is HVAC. Many manufacturers force the homeowner to buy their proprietary “communicating” thermostats and they are expensive( one manufacturer allows standard thermostats even on their 20 SEER variable speed units but they are the exception)
So, what you're saying is: the tech industry is just the latest and most convenient way for capitalists to abuse their own customers and manipulate a market to their own personal advantage, while harming everyone else?

PS: I love this very relevant Twitter account: https://twitter.com/internetofshit
 
  • Like
Reactions: Shirasaki
I do not allow any of these IoT devices on anything other than a guest network just in case, and every time a vendor does this, it is a reminder that we should expect the worst.
 
Note: While this wasn’t in the scope of our research, from what we have gathered, it appears that this vulnerability could be triggered via the Cloud interface (meaning, without a direct connection to the device).

This further highlights the need for the aforementioned steps, as the Wemo Cloud infrastructure could be used as a potential attack vector.
Pay close attention to the use of “appears” and “could”. :) These are the words people use when they really have NO idea if something is possible or not, want to present the information as “scary enough to forward to others” without getting into legal trouble. What they desire MORE than anything else, is for more people to know the name of their security company, that’s it. Without having done ANY kind of assessment of the Wemo Cloud, it’s irresponsible for them to say that something (which may be internally remediated 9 ways to Sunday) COULD happen.

“Though we have no idea if any of this is remotely possible in the real world, please be sure to spread this information far and wide!”
 
What needs to happen is that when companies decide it's no longer in their interest to support aging products, the product should be opened up to the community. Volunteers and enthusiasts can then maintain the devices and their firmware. In fact the older Belkin devices were running a fork of OpenWRT, so I'm sure it would be pretty easy for the OpenWRT project to directly support the devices and even provide ongoing security updates.

I have a handful of original generation WeMo plugs and in-wall switches that still function perfectly fine. I'd actually rather not replace them with a shady no-name product since they are actually well built and still function perfectly.

The problem is that the devices are designed to not accept firmware updates from third parties - again, in the name of security. While the device is supported, this is reasonable, but as soon as it is not supported, this should be opened up and the community should be allowed to maintain the devices. Nobody should have to replace a light switch every few years because a company chooses not to support the software. The moment support drops, a final firmware update should be made available for manual installation that unlocks any lockouts on the bootloader. Third party firmware can implement its own lockouts and safeguards.

In the end, the only good way to do IoT is self-hosted, self-managed IoT. You need to be in control of not only the devices but the backend that runs them and connects them to the Internet. Any of us with technical skill would have no issue running a server or spinning up a cheap VPS to host the backend. Home Assistant seems like it's trying to push things in this direction, but there's still way too much vendor lock-in. I mean, I still can't control my Nest thermostat myself without using Google's APIs...
 
If you bought this product the first day it was available it’s 4 years old. If you were an average buyer it’s about 3 years old. And now Belkin has declared it e-waste because it was defective from the start, and they can’t be bothered to fix it. Thanks to Belkin for helping to destroy the planet faster.☹️
Apple’s disposable AirPods are doing far more damage.
 
Such products should have several conditions imposed before sale:

  • Publish a binding intended minimum life;
  • Publish a binding policy on timescales to issue fixes;
  • Publish a binding policy if fixes become impossible;
  • Publish a binding policy on releasing information that would be required for third-party support;
  • Require compensation if conditions not met.
These policies being backed up by insurance, escrow (for code), etc. with punitive damages if broken.

And these policies being required (at least in summary) on advertising and promotional material.

Obviously, if a company sets a minimum life of one month, we can take our custom elsewhere.

Also, if the device consists of two or more parts, they need to be viewed together. For example, a switch and a controller – neither useful without the other functioning.

Obviously, this is wishful thinking. But some part of it might be possible.
Without a strong and unilaterally implemented legal framework worldwide, such restrain will forever be a wishful thinking. I know some people hates to see government stepping in every part of their life dictating what they can do, but corporation is corporation. We need something outside of corporations control to force the hand and pressure them to do the right thing. However incompetent some may think government is, that’s the best thing we have today.

A legally bound enforceable policy will have a big impact on how they do the business. Heck, mandatory mutual exclusion between “smart” Electronic part and electrical part should also be a good idea (basically means if electronics die, the gadget can still function like a normal plug/light/switch etc). Just imagine replacing your home plugs every 4 years instead of every, idk, 10 years, and cheaper to replace.
 
  • Like
Reactions: polyphenol
I own one of these. You're supposed to dispose of the plug after 4 years? If Belkin is going to call a smart plug 'end of life' at 4 years and not patch critical flaws, then I will boycott Belkin going forward and send it back to them.
 
I own one of these. You're supposed to dispose of the plug after 4 years? If Belkin is going to call a smart plug 'end of life' at 4 years and not patch critical flaws, then I will boycott Belkin going forward and send it back to them.
Well they work nicely and locally with homebridge - so you don’t need their ****** app.
Totally agree with your verdict on Belkin - since they ditched matter I avoid them and prefer EVE.

They have some nicely designed (I mean physically) stuff however (Outside WEMO)
 
I used to think Belkin were mostly very ordinary - no better than most other brands/vendors. Then, a number of years ago, they seemed to produce a few quite decent products. Now they have ended up being worse than many others, even more over-priced and definitely will only use if I am forced to.
 
I feel very uninformed based on what I am reading, and really hope members of this list can provide clarification. Some seem to say this is very serious, but wouldn’t protections in my other devices put a stop to any serious threats? For example, one poster mentioned that people could snoop on my network, but what would they be seeing? I would think, for example, they couldn’t listen into my conversations, unless they could also hack my HomePods, or other smart speakers, and even if they caused the smart plug to try to do that, the HomePod software should prevent it, right? Similarly, they couldn’t access my passwords, unless they could somehow capture my face, fingerprint, or device pass code, to access my keychain, or somehow install a key logger to detect if I manually type passwords, right? And what’s more, wouldn’t they need to infiltrate my Wi-Fi network to even find this device on it? Even if it is suggested that it can be done remotely through the Wemo cloud service, doesn’t that in itself make my devices secure, so that access to my account or network would first be needed, in order to even talk to this device? I promise I’m not trying to be a know it all here, because I don’t. I am genuinely looking for answers. It’s just that This is my current thinking, but I am not a security expert or networking expert, so I admit that I may be way off base here. Someone please, what is a practical example of how bad this actually really could be, by comparison to my current assumptions? Finally, how do you even know which model of these smart plugs you have? I cannot find it in the Apple home app or the Wemo app. Is it written on the smart plug itself? I am totally blind, but have not yet asked sighted family to look, as I thought certainly there would be a way to find out through the software.
 
The plug is connected to your WiFi. The exploit could overwrite the firmware to add extra functionality like sniffing your network constantly, issuing remote commands to your devices on your network. It gives them full access to your network and the devices on the network.
Nonsense!
 
  • Angry
Reactions: Shirasaki
Plus it would be trivial to collect networks and wait for easily exploitable vulnerabilities to crop up. Most people aren't exactly religious about updating, so they would probably have plenty of time.
This plug is just a 15$ wifi chip with a 5$ MCU equipped with no more than 10KB of memory. It can't play magic like what you described.
 
  • Angry
Reactions: Shirasaki
I’m skeptical of any IoT solution that requires a single IPv4 address.
They don't have externally exposed IP address. They connect to the mother ship via NAT and uPNP and the connection is guarded by your router. And, they are too much resource limited to do any actual harm.
 
  • Angry
Reactions: Shirasaki
Note: While this wasn’t in the scope of our research, from what we have gathered, it appears that this vulnerability could be triggered via the Cloud interface (meaning, without a direct connection to the device).

This further highlights the need for the aforementioned steps, as the Wemo Cloud infrastructure could be used as a potential attack vector.
Our phone, computer all constantly and actively commnunicate to cloud and they have endless vulnerability. I would bet my iPhone 14 has way more discovered yet unpublicized security vulnerabilities than a smart plug could have!
 
  • Angry
Reactions: Shirasaki
Does anyone know if it is possible to disable UPnP for each device?

Or does it have to be disabled completely on the router?
It will be easier by just creating an isolated WiFI network specifically for all those devices you don't trust. That's what I do to all those small things from China.
You can put a few lines of firewall rules in your router to block out-going traffic from specific devices but this defeats some usage scenarios, such as remotely switch the plug on/off to reset a dead computer.
 
Last edited:
  • Angry
Reactions: Shirasaki
This plug is just a 15$ wifi chip with a 5$ MCU equipped with no more than 10KB of memory. It can't play magic like what you described.
From the source article, which you seem not to have read:
”Looking at the smaller board, we could see the MediaTek SoC and the Winbond 512MB DRAM chips, shown in the image below. The MediaTek MT7688AN features a 580Mhz MIPS24KEc CPU and a 2.4 GHz WIFI connectivity, which would allow the device to run a Linux-based OS.”
 
They don't have externally exposed IP address. They connect to the mother ship via NAT and uPNP and the connection is guarded by your router. And, they are too much resource limited to do any actual harm.
You have misinterpreted what I meant by IP address. I mean public or private IP address.

Regardless of how a individual IoT node, sensor, or device connects to the Internet, if it has to directly connect to the Internet or a cloud provider to function or setup, this device individually is responsible for full implementation of all of the layers of the OSI model that allow for communication to the Internet: a full network stack.

On the other hand Relays, switches, sensors, and like using protocols such as zwave, insteon, x10, LoRa, old Zigbee which all require the base station to function take a different approach: no Internet connection. There’s no risk of an outside attacker gaining control over a device that never implemented a IP network stack. This device alone will never have any possible remote vulnerability. The standards it implements were written as a standard, and they all adhere to the standard. For example zwave communicates in the 900MHz spectrum and doesn’t need any Wi-Fi.

Their implementation for remote control is not local to the hardware - like Belkin’s switch.

Non “IP networked” iot devices instead are managed by a single node- a base station - that is potentially but not necessarily connected to the internet, which is subsequently the only way to access the IoT switch, sensor, or node outside of the home. It acts as a gatekeeper, a single node on your private IP Network, instead of many. I have 40 dumb IoT devices that are running off of one base station, so my up to date HP Enterprise Router, with the most current security update, routing table has 8 devices total: my Iot hub, my printer, my iPhone, Surface Duo, iPad, my three PCs. All of these are also still up to date with security updates and still fully supported.

The difference here is massive. Wi-Fi devices have the disadvantage that in order to be compatible with your router, and join a W-Fi network, they must each individually implement the same technology as a computer or smartphone.

There is my problem. I am skeptical of all IoT switches, sensors, etc that require any kind of communication from the single node, to the internet to function. While this may not be a major concern for you, the issue here is that it is a vulnerability that will not be addressed, ever. Wi-Fi is a band-aid solution for making a home users’ IoT experience more accessible and familiar. It was never designed for this type of application and does poorly at it too.

Since the attack doesn’t have to be local to a network to be a threat, it might be a distant possibility.

If I stick solely to devices that all do not have the Internet requirement, and manage it with a supported, easily updated, easy to upgrade base station, then only one device would be able to ever be compromised.
 
  • Love
Reactions: Shirasaki
If I stick solely to devices that all do not have the Internet requirement, and manage it with a supported, easily updated, easy to upgrade base station, then only one device would be able to ever be compromised.
If the base station is compromised then the remote devices become reachable. If the remote devices allow OTA firmware updates then their firmware can be rewritten and the attacker achieves gain of function.
 
If the base station is compromised then the remote devices become reachable. If the remote devices allow OTA firmware updates then their firmware can be rewritten and the attacker achieves gain of function.
The remote devices are too dumb to do anything with except for maybe turn on and off my lights. The additional piece is that my router doesn’t allow the IoT base station access directly to the Internet, but only available via VPN connection.

If they could access the base station, The nodes - switches and such - are from the 90s and 2000s and are only capable of receiving very primitive signals…. most certainly don’t have the capability to implement a full installation of Linux.

There would not be enough bandwidth anyways to transmit this amount of information- Where most of it is transmitted via a power line modem or at 900 MHz. None of these things have a IP address. I seriously doubt the utility in an attacker learning how to communicate and control my home over my vpn, to my iot base station, to send terminal commands from a power line modem to my dumb regan-bush-clinton-bush era IoT devices.

The Zwave 700 devices are the most vulnerable devices here and even then one has to assume that my VPN has been compromised, and that Universal Devices has not been maintaining their UNIX-based operating system on this brand spanking new device.

Wheras zwave 700 specifications convey a level of security that is standardized and importantly versioned, what is the standards that a wi-fi device adheres to?

Can I take a Wi-Fi product out of the box and use it without the internet? Probably not. You cannot even use it without giving it your wi-fi password that it probably stores in plaintext on its clouds service.
 
  • Love
Reactions: Shirasaki
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.