Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover

LG WebOS TV Vulnerability Let Attackers Bypass Authentication and Enable Full Device Takeover

Posted on September 16, 2025September 16, 2025 By CWS

A essential vulnerability has been found in LG’s WebOS for sensible TVs, permitting an attacker on the identical native community to bypass authentication mechanisms and obtain full management over the system.

The flaw, which impacts fashions just like the LG WebOS 43UT8050, allows unauthenticated attackers to realize root entry, set up malicious functions, and utterly compromise the tv. The vulnerability was disclosed throughout the TyphoonPWN 2025 hacking competitors, the place it secured first place.

The assault chain begins with a flaw within the browser-service working on the TV. This service prompts on port 18888 when a USB storage system is related. It exposes an API endpoint, /getFile, meant to permit peer gadgets to obtain recordsdata from particular directories.

path traversal

Based on SSD-Disclosure, the vulnerability is because of an absence of correct enter validation on the trail parameter, the service is weak to path traversal. This permits an attacker to request and obtain any file from the TV’s filesystem without having to authenticate.

By exploiting this path traversal flaw, an attacker can entry delicate system recordsdata. The first goal is the database file situated at /var/db/primary/, which accommodates authentication keys for purchasers which have beforehand paired with the TV’s secondscreen.gateway service.

Armed with these keys, the attacker can impersonate a legit shopper and hook up with the secondscreen service, bypassing all authentication checks. This grants them high-privilege entry to the TV’s core capabilities.

From Vulnerability to Gadget Takeover

As soon as authenticated to the secondscreen service, the attacker has the privileges wanted to allow developer mode on the system. From there, they’ll use developer instruments to put in any software, together with malware designed to spy on the consumer, steal information, or use the TV as a bot in a bigger community of compromised gadgets.

The proof-of-concept demonstrates how an attacker can leverage this entry to execute arbitrary instructions, successfully gaining root management and taking up the tv.

The whole course of might be automated with a easy script, permitting for speedy exploitation as soon as preliminary entry to the native community is gained.

In response to the disclosure, LG has launched the safety advisory SMR-SEP-2025 and urges customers to make sure their gadgets are up to date with the most recent firmware to mitigate the menace.

Free dwell webinar on new malware ways from our analysts! Study superior detection methods -> Register for Free

Cyber Security News Tags:Attackers, Authentication, Bypass, Device, Enable, Full, Takeover, Vulnerability, WebOS

Post navigation

Previous Post: New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
Next Post: Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims

Related Posts

Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day Cyber Security News
DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools Cyber Security News
INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards Cyber Security News
Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines Kimsuky Hackers Using ClickFix Technique to Execute Malicious Scripts on Victim Machines Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News