Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom
This talk demonstrates a hardware and software security analysis of the IPVideo HALO 3C smart sensor, an IoT device commonly deployed in schools for vape and aggression detection. The researchers performed a hardware teardown, revealing a Raspberry Pi Compute Module 4, and identified critical vulnerabilities including an insecure firmware update mechanism and a hardcoded administrative backdoor. The presentation shows how these flaws allow an attacker to gain root access, disable sensors, and repurpose the device as a covert audio surveillance tool. The findings highlight the significant privacy and security risks associated with deploying opaque, network-connected surveillance hardware in sensitive environments.
Rooting the School Bathroom: Exploiting the IPVideo HALO 3C Smart Sensor
TLDR: The IPVideo HALO 3C smart sensor, widely deployed in schools for vape and aggression detection, contains critical vulnerabilities including an insecure firmware update mechanism and a hardcoded administrative backdoor. These flaws allow an attacker to gain root access, disable sensors, and repurpose the device as a covert audio surveillance tool. Security researchers and penetration testers should prioritize identifying these devices on internal networks, as they represent a significant, often overlooked, privacy and security risk.
Surveillance technology in schools is often sold as a "set it and forget it" solution for safety, but the reality is that these devices are frequently just poorly secured IoT boxes running on top of commodity hardware. The IPVideo HALO 3C is a prime example. Marketed as a way to detect vaping and aggression in private spaces like bathrooms, it is essentially a network-connected computer that has been given a pass on the rigorous security scrutiny we apply to other enterprise infrastructure.
The Hardware Reality
A teardown of the HALO 3C reveals that it is not some custom-built, hardened security appliance. At its core, the device is powered by a Raspberry Pi Compute Module 4, running a standard Linux distribution. This is a common pattern in modern IoT: taking a powerful, general-purpose single-board computer and wrapping it in a proprietary shell.
For a penetration tester, this is a gift. Once you have physical access to the device, you are essentially dealing with a standard Linux environment. The researchers behind the "Snitch Puck" talk demonstrated that by removing the Compute Module and using a carrier board, they could bypass the device's secure boot protections—which were effectively non-existent in practice—to dump the firmware and gain a foothold.
Exploiting the Firmware Update Mechanism
The most egregious vulnerability identified is the device's firmware update process. The HALO 3C accepts firmware updates via a web-based API. The researchers found that the update script, extup.sh, performs no signature verification on the uploaded files.
When a user uploads a file, the device extracts it and checks for a file named extra. If that file exists, the device executes it with root privileges. This is a classic Command Injection scenario. An attacker with access to the web interface can simply upload a malicious archive containing a reverse shell script, trigger the update, and gain full control over the device.
# Simplified representation of the vulnerable update logic
if [ -f "extra" ]; then
./extra
fi
This vulnerability is compounded by the device's authentication implementation. The web interface uses a Broken Access Control flaw where the administrative backend can be accessed by spoofing the source IP or by exploiting the weak session management. The researchers found that the authentication logic relies on a cookie-based system that is trivial to manipulate, allowing an unauthenticated user to reach the administrative endpoints.
Turning a Sensor into a Spy Tool
Once root access is achieved, the device's primary function—monitoring for vape or aggression—becomes a secondary concern. The HALO 3C is equipped with MEMS microphones for its audio analysis features. Because the device is running a full Linux stack, an attacker can easily install standard networking tools like netcat or aplay to stream audio directly from the device to a remote listener.
The researchers demonstrated this by using nc to pipe the audio stream from the device's microphones to a remote machine. Because the device is designed to be mounted in sensitive, private areas like bathrooms, the potential for abuse is extreme. There is no physical indicator on the device to show that it is currently streaming audio, making this a perfect, albeit illegal, covert listening post.
Real-World Engagement Strategy
During a penetration test, these devices are often found on the same VLAN as other IoT hardware, frequently with default or easily guessable credentials. If you encounter a HALO 3C on a network, your first step should be to fingerprint the web interface. If you can reach the login page, you are already halfway to a full compromise.
Use arp-scan to identify the device on the network. Once identified, attempt to access the administrative interface. If you find an older firmware version, you can likely achieve code execution using the update mechanism described above. Even if the device is patched, the underlying architecture remains a liability.
Defensive Considerations
For blue teams, the primary defense is network segmentation. These devices should never be on a flat network where they can communicate with sensitive internal systems. They should be isolated in a dedicated IoT VLAN with strict egress filtering. If the device does not need to reach the internet, block all outbound traffic.
Furthermore, organizations should demand transparency from vendors regarding the hardware and software components used in their "security" products. If a vendor cannot provide a clear, verifiable security architecture—including signed firmware updates and robust, non-bypassable authentication—they should not be allowed to deploy their hardware in your environment.
Security is not a feature that can be bolted on after the fact. When we treat surveillance hardware as a black box, we invite the very risks we are trying to mitigate. The next time you see a "smart" sensor in a school or office, remember that it is just another Linux box, and it is likely just as vulnerable as the rest of the network.
Vulnerability Classes
Target Technologies
Attack Techniques
Up Next From This Conference

DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks

Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen

Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

