1.1 Million Baby Monitors and Security Cameras Exposed in Meari Technology Breach

1.1 Million Baby Monitors and Security Cameras Exposed in Meari Technology Breach
Security researcher Sammy Azdoufal extracted a single cryptographic key from Meari Technology's Android application that granted him remote access to 1.1 million baby monitors and security cameras across 118 countries. The vulnerability affected devices manufactured by the Chinese white-label supplier and sold under hundreds of different brand names, including products from major customers Wyze and Zhiyun.
Meari Technology operates as a white-label manufacturer whose cameras ship under generic brands including Arenti, Anran, Boifun, and ieGeek, according to The Verge. Financial records indicate Zhiyun as Meari's largest customer, with Wyze representing one of its biggest partnerships. At least one Petcube pet-monitoring camera also appears to be a Meari product.
The exposure included devices from Intelbras, which comprised many of the hackable cameras in Azdoufal's research. The security flaw stemmed from weak password practices on Meari's scheduled task platform, creating what the company later acknowledged as a "risk of potential Remote Code Execution (RCE)."
Single Point of Failure
The breach demonstrates the cascading vulnerabilities inherent in white-label manufacturing at scale. A single compromised API key provided unauthorized access to devices manufactured under disparate brand names across six continents. This architecture creates systemic risk where one security failure affects hundreds of seemingly unrelated products.
Azdoufal's access persisted until March 10, when Meari Technology cut off researcher access and closed the primary security hole. The company's response indicates awareness of the vulnerability's scope, though the timeline between discovery and remediation remains unclear from available documentation.
Broader IoT Security Landscape
This incident follows established patterns in IoT device security failures. We have seen this pattern before, when ThroughTek's Kalay platform vulnerability exposed millions of smart home devices in late 2020, and when Rapid7 identified systematic security flaws across nine baby monitor brands in 2015.
The ThroughTek vulnerability, discovered by Mandiant researchers, allowed attackers to intercept audio and video streams from affected devices. That incident affected customers including Chinese electronics manufacturer Xiaomi and required targeted knowledge of software protocols and device identifiers for exploitation. CISA subsequently urged affected customers to implement software fixes.
Rapid7's 2015 research revealed hidden hardcoded credentials, unencrypted video streaming, and inadequate API protection across all tested baby monitor devices. The firm rated each device on a 250-point security scale, finding serious problems and design flaws universally present.
Regulatory Response Precedent
Federal enforcement has targeted similar security failures in connected devices. The FTC penalized TRENDnet for transmitting customer login credentials in readable text rather than encrypted formats. The agency also pursued legal action against D-Link over security vulnerabilities in devices including the Digital Baby Monitor Day/Night Cloud Camera and Wireless N Network Camera.
These enforcement actions establish regulatory expectations for basic security practices in consumer IoT devices, particularly those handling sensitive audio and video data from private spaces.
Technical Infrastructure
Meari Technology produces baby monitoring PTZ cameras including the Baby 2T, Baby 4T, and Baby 5T models, alongside LCD monitor configurations featuring 4.3-inch and 5-inch screens in the Baby 2M and Baby 3M respectively. The cameras incorporate automatic movement tracking to maintain infant positioning within the frame.
The company's product portfolio extends beyond baby monitors to include 4G AOV cameras, the Baby Monitor Camera C1, and the Pet Feeder P1. This diversification across IoT categories amplifies the potential impact of platform-level security vulnerabilities.
Meari operates a Product Security Incident Response Team (MEARI PSIRT) as the designated channel for vulnerability disclosure. The team accepts reports from users, partners, suppliers, security agencies, and independent researchers via email, though the effectiveness of this process in preventing the current incident remains unclear.
Looking at what this means for the connected device ecosystem, the Meari breach underscores the concentrated risk created by white-label manufacturing models. When hundreds of brands rely on a single platform provider, security failures propagate across seemingly diverse product lines, creating exposure that extends far beyond any individual brand's market presence.
The incident highlights the ongoing challenge of securing IoT devices where economic incentives favor rapid deployment over comprehensive security implementation. As connected devices proliferate across intimate spaces like nurseries and homes, the stakes for preventing such systematic vulnerabilities continue to escalate.


