Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Pass the PMP® Exam on Your First Try — Expert-Led Training
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Discover how vulnerability researchers executed a remote code execution attack on Ruijie access points in this 38-minute Black Hat conference talk. Learn about an attack chain that begins simply by sniffing WIFI beacons and escalates to full device control and network infiltration. Follow the researchers' journey as they extract Ruijie's firmware, analyze cloud-communication binaries, and uncover critical vulnerabilities—including one that allowed generating MQTT passwords for all Ruijie devices. See how they impersonated Ruijie cloud services to exploit an "execute-command-as-a-service" feature, gaining complete control over tens of thousands of devices. Gain insights into research techniques and common IoT cloud security pitfalls that can lead to fleet-wide device exploitation.
Syllabus
The Insecure IoT Cloud Strikes Again: RCE on all Ruijie Cloud-Connected Devices
Taught by
Black Hat