Do you have a Wyze Cam?  If you’re not sure what that is, it’s an internet camera that offers a low-cost solution to those who are interested in playing around with video and not willing to spend a ton of money on it.

Unfortunately, in this instance it’s a budget option with a bite and a significant drawback.  The camera has a bug in its firmware which allows for unauthenticated remote access to videos and images stored on the camera’s local memory cards.

Even worse, although this bug has never been assigned a CVE ID, it has been a known issue for more than three years.  Any remote user listening on port 80 can access the contents of the SD card in the camera.

The issue is that upon inserting an SD card into the WyzeCam, the camera automatically creates a symlink to it in the www directory which is served by the WyzeCam webserver without any access restrictions whatsoever.

So basically, if you have one of these be very careful about what images and videos you store on it because literally anyone who wants to can snoop around your camera and see what you’ve been taking videos and pictures of.

Worst of all is that most of the people who use this type of equipment tend to use a “set and forget” philosophy, so you may have purchased one of these months or even years ago and not given the matter another thought.

If that’s the case, it pays to do some housekeeping.  Review the contents of the SD card and possibly disconnect the camera. If that fails, relocate it and only turn it on when you’re sure you want to record something.

This is going to continue to be a problem with most of the equipment on the “Internet of Things” until we hold manufacturers to account.  Not only should this not be an issue at all, but it also shouldn’t have lingered for so long without being attended to.  That’s unfortunate.

Related Posts - TKS Blog
Cloud Computing for Business Growth: Scalability, Migration & Multi-Cloud Strategy
Organizations that rely solely on traditional, on-premises infrastructure often struggle with scalability, rising IT costs, limited agility, and increased operational risk. Cloud computing technology has fundamentally...
Read more
Cybersecurity in 2026: Resolutions Every Business Owner Should Make
A New Year Offers the Perfect Moment to Refresh Your Security Strategy The calendar has flipped to 2026, and while personal resolutions are top of mind,...
Read more
Cybersecurity Compliance Checklist for 2026: CPAs & Financial Firms
A Practical Guide for Louisiana Accounting Firms, Banks, and Credit Unions Compliance Is No Longer Optional Cybercrime isn’t slowing down, and neither are regulators. For CPAs, accounting...
Read more
IT Budgeting Checklist for BusinessIT Budgeting Checklist for Business
Tech Health Check: Is Your Business Ready for 2026?
Before you pop the champagne, make sure your IT isn’t popping errors. Year‑end is the best window to tune up your technology stack by tightening...
Read more

Used with permission from Article Aggregator