A vulnerability in the latest firmware of the network-enabled Samsung TV models allows potential attackers to crash the vulnerable devices using Denial of Service (DoS) Attack, according to security researcher Malik Mesellem.
According to Malik, The web server (DMCRUIS/0.1) installed on Smart TVs on port TCP/5600 can be crashed to reboot the device, if attacker will send a long HTTP GET request on TV's ip address.

Malik successfully tested the exploit on his Samsung PS50C7700 plasma TV, as shown in the video demonstration below:


In the Demo, The TV is connected by ethernet cable to a home network, and after running the exploit against TV's ip address - A few seconds later, the TV would restart and repeat the process.

This means that a potential attacker only needs to obtain access to the LAN that the TV has joined, in order to attack it. This can be done either by breaking into a wireless access point or by infecting a computer on the same network with malware.

Malik discovered the flaw on July 21st, 2013, published a proof-of-concept exploit on his website and vulnerability dubbed CVE-2013-4890. I think, now we need firewall or antivirus protection for our television set too.

Samsung did not immediately return a request for comment sent via email.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.