1.1 Million Baby Monitors Exposed by Single Security Key

Key Takeaways

- 1.1 million cameras across 118 countries were accessible using one extracted key
- Default passwords included 'admin' and 'public' with no enforcement of changes
- Tens of thousands of photos were stored on public URLs without any password protection
A baby's eyes peer into a camera lens. A child in a policeman costume stands in frame. A messy bedroom with Hello Kitty decorations. These images, captured by home security cameras, were viewable by anyone who knew where to look.
French security researcher Sammy Azdoufal discovered that 1.1 million baby monitors and security cameras made by Meari Technology were accessible remotely. The cameras, sold under dozens of brand names, broadcast their data to anyone with the right key. Azdoufal extracted that key from the Android app.
The Scope of Exposure
Meari Technology is a Chinese white-label manufacturer. Their cameras ship under hundreds of different brand names on Amazon and other retailers. Names like Arenti, Anran, Boifun, and ieGeek. Financial records show the company's customers include major players: Wyze, Zhiyun, and Intelbras. At least one Petcube pet camera appears to be a Meari product as well.
If you bought a budget baby monitor or security camera online, there's a reasonable chance Meari made it.

Azdoufal found the vulnerability the same way he previously discovered access to thousands of DJI Romo robot vacuums. By inspecting the Android app, he extracted a single key that unlocked devices across 118 countries. Every one of those million devices was broadcasting information to anyone who knew how to listen.
Related: how companies are addressing security vulnerabilities
Passwords Set to 'Admin' and 'Public'
The technical failures went beyond the shared key. Many cameras were still using default passwords. One password was simply "admin." Another was "public." Users were never required to change them.
When Azdoufal connected the MQTT datastream to a world map, he could see everything. He could see into people's homes. He could see email addresses and rough locations of camera owners.

Tens of thousands of photos captured by these cameras sat on Alibaba servers at public web addresses. No password. No encryption. No protection at all.
“I can retrieve the picture without any passwords, no cracking, no hacking. I just click on the URL and this image is showing.”
— Sammy Azdoufal, security researcher
A Pattern of Poor IoT Security
This is not Azdoufal's first discovery of mass IoT vulnerabilities. He previously found that DJI Romo robot vacuums had security so poor he could remotely access thousands of them. The pattern suggests systemic failures in how budget IoT devices handle authentication and data protection.
The white-label model makes accountability murky. Consumers buy from brands like Wyze or Intelbras. Those brands source hardware from Meari. Security flaws originate at the manufacturer level but affect users across dozens of retail brands.

What Camera Owners Should Do
If you own a baby monitor or security camera from any of the mentioned brands, check if it's a Meari device. Look for the Meari name in the app settings or on the device itself. The company sells under so many labels that identifying affected products is difficult.
- Change default passwords immediately if you haven't already
- Check if your camera app is connected to Meari's cloud services
- Consider cameras from manufacturers with established security track records
- Segment IoT devices on a separate network from computers and phones
Azdoufal reported the vulnerability through responsible disclosure. Meari paid a bug bounty, suggesting they acknowledged the flaw.

Logicity's Take
Frequently Asked Questions
Which baby monitor brands are affected by the Meari security flaw?
Cameras from Arenti, Anran, Boifun, ieGeek, Intelbras, and potentially Wyze and Petcube. Meari manufactures white-label products for hundreds of brands.
How were 1.1 million cameras accessed?
A security researcher extracted a single authentication key from the Android app. This key provided access to devices across 118 countries. Many cameras also used default passwords like "admin" or "public."
Were photos from these cameras actually exposed?
Yes. Tens of thousands of photos were stored on Alibaba servers at public URLs with no password protection. Anyone with the URL could view them.
How do I know if my camera is made by Meari?
Check the app settings or device documentation for Meari branding. Many budget cameras sold on Amazon under generic names are Meari products.
Has Meari fixed the vulnerability?
The company paid a bug bounty to the researcher who disclosed the flaw, indicating they acknowledged it. The current status of patches is unclear.
Need Help Implementing This?
Manaal Khan
Tech & Innovation Writer
Related Articles
Browse all
Robotaxi Companies Are Hiding How Often Humans Take the Wheel
Autonomous vehicle firms like Waymo and Tesla are under scrutiny for refusing to disclose how often remote operators step in to control their self-driving cars. A Senate investigation reveals major gaps in transparency, raising safety and accountability concerns.

Wisconsin Governor Throws a Wrench in Age Verification Plans
Wisconsin Governor Tony Evers has vetoed a bill that would have required residents to verify their age before accessing adult content online, citing concerns over privacy and data security. This move comes as several other states have already implemented similar age check requirements. The veto has significant implications for the future of online age verification.

Apple's App Store Empire Under Siege: The Battle for the Future of Tech
The long-running feud between Apple and Epic Games has reached a boiling point, with Apple preparing to take its case to the Supreme Court. The tech giant is fighting to maintain control over its App Store, while Epic Games is pushing for more freedom for developers. The outcome could have far-reaching implications for the entire tech industry.

Tesla's Remote Parking Feature: The Investigation That Didn't Quite Park Itself
The US auto safety regulators have closed their investigation into Tesla's remote parking feature, but what does this mean for the future of autonomous driving? We dive into the details of the investigation and what it reveals about the technology. The National Highway Traffic Safety Administration found that crashes were rare and minor, but the investigation's closure doesn't necessarily mean the feature is completely safe.
Also Read

Linux Kernel Killswitch Proposal Would Block Vulnerable Functions
An Nvidia engineer has proposed adding a killswitch to the Linux kernel that would let administrators disable vulnerable functions while waiting for security patches. The proposal comes one week after researchers discovered a root exploit called Copyfail that left users exposed during the patch window.

F1 Tweaks 2027 Engine Rules to Fix Hybrid Power Problems
Formula 1 stakeholders have agreed in principle to rebalance the V6 hybrid power split for 2027. The change adds 50 kW to the combustion engine while reducing electric motor output by the same amount. This follows complaints that the 2026 regulations left cars struggling with battery depletion mid-lap.

Google Stops First AI-Developed Zero-Day Exploit
Google's Threat Intelligence Group intercepted a zero-day exploit that shows evidence of AI involvement in its creation. The attack targeted two-factor authentication in a web-based administration tool, and researchers found telltale signs like hallucinated security scores in the code.