{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:20:55Z","timestamp":1757614855280,"version":"3.44.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:00Z","timestamp":1751241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006565","name":"University of Johannesburg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006565","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>As more telecommunication network technologies emerge, and IoT devices powered by embedded systems increase, so malicious attackers have developed more techniques and critical skills to exploit known and unknown vulnerabilities of these devices. Compromised embedded system devices can provide unauthorised access and privileges to spy, control, and disable the devices, and most times third-party organizations that retail these devices can compromise these embedded system devices with backdoors or rootkits for persistent access. Most systems and technologies built with embedded hardware and software are not easily assessed for vulnerabilities due to the difficulty in finding physical debug interfaces to dump the device\u2019s kernel root file system or firmware. With practical and technical research skills we were able to access and dump the kernel root file system of our target embedded device through the UART debug interface. In our case, the target device was a HomePlug AV powerline communications adapter, which is assessed for exploitable vulnerabilities and bugs in the embedded system software, via the UART debug interface. Detected vulnerabilities and bugs are reported as common vulnerabilities and exposures (CVEs) and as security awareness for the public that uses these embedded devices.<\/jats:p>","DOI":"10.1007\/s10207-025-01081-5","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T14:38:19Z","timestamp":1751294299000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter"],"prefix":"10.1007","volume":"24","author":[{"given":"Emmanuel","family":"Uwaezuoke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1525-7728","authenticated-orcid":false,"given":"Theo G.","family":"Swart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"1081_CR1","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.3390\/electronics12051176","volume":"12","author":"SA Baho","year":"2023","unstructured":"Baho, S.A., Abawajy, J.: Analysis of consumer IoT device vulnerability quantification frameworks. Electronics 12, 1176 (2023). https:\/\/doi.org\/10.3390\/electronics12051176","journal-title":"Electronics"},{"key":"1081_CR2","unstructured":"IoT connected devices worldwide 2019\u20132030, Statista. (n.d.) https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/ Accessed May 3 2023"},{"key":"1081_CR3","doi-asserted-by":"publisher","unstructured":"Arturo, D., Roma\u00f1a, L., Takemori, K., Kubota, S., Sugitani, K., Musashi, Y.: Towards the design of hardware based security device and communication implementation. In: 2009 Second International Conference on Intelligent Networks and Intelligent Systems, IEEE, Tianjian, China. pp. 250\u2013252 (2009). https:\/\/doi.org\/10.1109\/ICINIS.2009.70","DOI":"10.1109\/ICINIS.2009.70"},{"key":"1081_CR4","unstructured":"Kovacs, E.: 70 Percent of IoT Devices Vulnerable to Cyberattacks: HP, SecurityWeek. https:\/\/www.securityweek.com\/70-iot-devices-vulnerable-cyberattacks-hp\/ (2014). Accessed May 3 2023"},{"key":"1081_CR5","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1109\/TPWRS.2016.2631891","volume":"32","author":"G Liang","year":"2017","unstructured":"Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Syst. 32, 3317\u20133318 (2017). https:\/\/doi.org\/10.1109\/TPWRS.2016.2631891","journal-title":"IEEE Trans. Power Syst."},{"key":"1081_CR6","unstructured":"Major cyber attack disrupts internet service across Europe and US | Internet | The Guardian, (n.d.). https:\/\/www.theguardian.com\/technology\/2016\/oct\/21\/ddos-attack-dyn-internet-denial-service Accessed May 3, 2023"},{"key":"1081_CR7","unstructured":"Soltan, S., Mittal, P., Poor, H.V.: BlackIoT: IoT Botnet of high wattage devices can disrupt the power grid. In: Proc. 27th USENIX Conf. security symposium. USENIX Association, USA. pp. 15\u201332 (2018)"},{"key":"1081_CR8","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-57878-7_11","volume-title":"Applied Cryptography and Network Security","author":"S Hoffmann","year":"2020","unstructured":"Hoffmann, S., M\u00fcller, J., Schwenk, J., Bumiller, G.: Powerless security: a security analysis of in-home power line communications based on HomePlug AV2. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) Applied Cryptography and Network Security, pp. 213\u2013232. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57878-7_11"},{"key":"1081_CR9","doi-asserted-by":"publisher","unstructured":"Liu, W., Niu, H., Luo, W., Deng, W., Wu, H., Dai, S., Qiao, Z., Feng, W.: Research on technology of embedded system security protection component. In 2020 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), IEEE. pp. 21\u201327 (2020). https:\/\/doi.org\/10.1109\/AEECA49918.2020.9213603","DOI":"10.1109\/AEECA49918.2020.9213603"},{"key":"1081_CR10","doi-asserted-by":"publisher","unstructured":"Ukil A., Sen, J., Koilakonda, S.: Embedded security for Internet of Things. In: 2011 2nd National Conference on Emerging Trends and Applications in Computer Science, IEEE, Shillong, India. pp. 1\u20136 (2011) https:\/\/doi.org\/10.1109\/NCETACS.2011.5751382","DOI":"10.1109\/NCETACS.2011.5751382"},{"key":"1081_CR11","doi-asserted-by":"publisher","unstructured":"Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), IEEE, Izmir, Turkey. pp. 145\u2013152 (2015). https:\/\/doi.org\/10.1109\/PST.2015.7232966","DOI":"10.1109\/PST.2015.7232966"},{"key":"1081_CR12","doi-asserted-by":"publisher","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: Current status, challenges and prospective measures. In: 2015 10th international conference for internet technology and secured transactions (ICITST), IEEE, London, United Kingdom. pp. 336\u2013341 (2015). https:\/\/doi.org\/10.1109\/ICITST.2015.7412116","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"1081_CR13","doi-asserted-by":"publisher","unstructured":"Liu, Z., El Fawal, A., Le Boudec, J.: Coexistence of Multiple HomePlug AV Logical Networks: a measurement based study. In: 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, IEEE, Houston, TX, USA. pp. 1\u20135 (2011) https:\/\/doi.org\/10.1109\/GLOCOM.2011.6133818","DOI":"10.1109\/GLOCOM.2011.6133818"},{"key":"1081_CR14","unstructured":"Pe\u0148a, E.: UART: A Hardware Communication Protocol Understanding Universal Asynchronous Receiver\/Transmitter, (n.d.)"},{"key":"1081_CR15","unstructured":"FastBitLab, STM32 USART Lecture 8\u202f: USART Baud rate calculation Part-1, FastBit EBA. https:\/\/fastbitlab.com\/stm32-usart-lecture-8-usart-baud-rate-calculation-part-2\/ (2021). Accessed July 6, 2023"},{"key":"1081_CR16","unstructured":"CP2102\u20139.pdf, (n.d.). https:\/\/www.silabs.com\/documents\/public\/data-sheets\/CP2102-9.pdf Accessed July 6, 2023"},{"key":"1081_CR17","doi-asserted-by":"publisher","unstructured":"Shaila, C.K., Manoj, G., Divya, P.S., Vijila, M.: Functional verification of SPI protocol using UVM based on AMBA architecture for flash memory applications. In: 2023 4th International Conference on Signal Processing and Communication (ICSPC). pp. 311\u2013315 (2023) https:\/\/doi.org\/10.1109\/ICSPC57692.2023.10125890","DOI":"10.1109\/ICSPC57692.2023.10125890"},{"key":"1081_CR18","unstructured":"rampageX, Firmware Modification Kit. https:\/\/github.com\/rampageX\/firmware-mod-kit (2023) Accessed September 3, 2023"},{"key":"1081_CR19","doi-asserted-by":"publisher","unstructured":"Nasr, E., Shahrour, I.: Evaluating wireless network vulnerabilities and attack paths in smart grid comprehensive analysis and implementation. In: 2017 Sensors Networks Smart and Emerging Technologies (SENSET). pp. 1\u20134 (2017) https:\/\/doi.org\/10.1109\/SENSET.2017.8125032","DOI":"10.1109\/SENSET.2017.8125032"},{"key":"1081_CR20","doi-asserted-by":"publisher","unstructured":"Tomar, D.S.: A prototype system to scrutinize PHP code injection attacks. In: 2012 7th International Conference on Computer Science & Education (ICCSE). pp. 1195\u20131199 (2012) https:\/\/doi.org\/10.1109\/ICCSE.2012.6295277","DOI":"10.1109\/ICCSE.2012.6295277"},{"key":"1081_CR21","doi-asserted-by":"publisher","unstructured":"Mahmood, H.B.: Transport layer security protocol in Telnet. In: 9th Asia-Pacific Conference on Communications. IEEE Cat No03EX732. pp. 1033\u20131037 Vol.3. (2003) https:\/\/doi.org\/10.1109\/APCC.2003.1274255","DOI":"10.1109\/APCC.2003.1274255"},{"key":"1081_CR22","unstructured":"NVD - CVE-2019\u201313474, (n.d.). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13474 Accessed September 11, 2023"},{"key":"1081_CR23","doi-asserted-by":"publisher","unstructured":"Nachtigall,M., Nguyen Quang Do, L., Bodden, E.: Explaining Static Analysis - A Perspective. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering Workshop (ASEW). pp. 29\u201332 (2019) https:\/\/doi.org\/10.1109\/ASEW.2019.00023","DOI":"10.1109\/ASEW.2019.00023"},{"key":"1081_CR24","doi-asserted-by":"publisher","unstructured":"Shahriar, H., and Zulkernine, M.: Injecting comments to detect JavaScript code injection attacks. 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops. IEEE. (2011) https:\/\/doi.org\/10.1109\/COMPSACW.2011.27","DOI":"10.1109\/COMPSACW.2011.27"},{"key":"1081_CR25","unstructured":"D-Link Systems, \u201cDHP-W310AV\/DHP-W311AV Kit: All hardware revisions\/All Firmware versions: End-of-Life (EOL)\/End-of-Service (EOS): Reported Vulnerabilities After EOL\/EOS,\u201d https:\/\/supportannouncement.us.dlink.com\/security\/publication.aspx?name=SAP10429 (2025) Accessed 27 May 2025"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01081-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01081-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01081-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:22Z","timestamp":1757072002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01081-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1081"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01081-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"8 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research work has no possible conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We therefore declare that the manufacturer of the target device used in this research work was appropriately informed about the publication of these vulnerabilities. Even though the product has reached EOL, it can still potentially be in use by numerous consumers, and it is thus important that these vulnerabilities be made public.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publications"}}],"article-number":"168"}}