The CallStranger vulnerability can also be used to launch major DDoS attacks.
A severe vulnerability resides in a core protocol found in almost all internet of things (IoT) devices.
The vulnerability, named CallStranger, allows attackers to hijack smart devices for distributed denial of service (DDoS) attacks, but also for attacks that bypass security solutions to reach and conduct scans on a victim's internal network -- effectively granting attackers access to areas where they normally wouldn't be able to reach.
CallStranger bug impacts UPnP
According to
a website dedicated to the CallStranger vulnerability published today, the bug impacts UPnP, which stands for
Universal Plug and Play, a collection of protocols that ship on most smart devices.
... ...