ThroughTek Kalay P2P SDK
ThroughTek Kalay P2P SDK contains an improper access control vulnerability (CWE-284) affecting IP camera devices and equipment that use the P2P platform for remote connectivity. The vulnerability exists in SDK versions prior to 3.1.10, in SDK builds without SSL (nossl tag), in device firmware using P2PTunnel or RDT modules without proper authentication, and in devices using the AVAPI module without DTLS encryption enabled. An attacker can achieve remote code execution and unauthorized access to sensitive information including camera audio and video feeds.
- Internet or network access to port used by Kalay P2P SDK (commonly used by IP cameras)
- Target device must be running vulnerable SDK version (<=3.1.10) or specific vulnerable configurations (nossl builds, P2PTunnel/RDT without authkey, AVAPI without DTLS)
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6639115e-977d-488b-8ce6-21f15978ad7aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.