{"id":95437,"date":"2019-05-30T09:50:39","date_gmt":"2019-05-30T16:50:39","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=95437"},"modified":"2025-06-02T20:59:48","modified_gmt":"2025-06-03T03:59:48","slug":"mr-coffee-with-wemo-double-roast","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/","title":{"rendered":"Mr. Coffee with WeMo: Double Roast"},"content":{"rendered":"<p>McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/your-smart-coffee-maker-is-brewing-up-trouble\/\" target=\"_blank\" rel=\"noopener noreferrer\">earlier blog<\/a> to catch up with the processes and techniques I used to investigate and ultimately compromise this smart coffee maker. While researching the device, there was always one attack vector that I had wanted to revisit. It was during the writing of that blog that I was finally able to circle back to it. As it turns out, my intuition was accurate; the second vulnerability I found was much simpler and still allowed me to gain root access to the target.<\/p>\n<h2><strong>Recapping the original vulnerability<\/strong><\/h2>\n<p>The first vulnerability modified the \u201ctemplate\u201d section of the brew schedule rule file, which a is unique file that is sent when the user schedules a brew in advance. I also needed to modify the template itself, sent from the WeMo App directly to the coffee maker. During that research I noticed that many of the other fields could be impactful but did not investigate them as thoroughly as the template field.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-95440 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/Picture1-2.png\" alt=\"\" width=\"974\" height=\"766\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture1-2.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture1-2-300x236.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture1-2-768x604.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture1-2-636x500.png 636w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p><em>Figure 1: Brew schedule rule<\/em><\/p>\n<p>When the user schedules a brew, an individual rule is added to the Mr. Coffee root crontab. The crontab entry uses the rule\u2019s \u201cid\u201d field to make sure the correct rule is executed at the desired time.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-95441 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/Picture2-2.png\" alt=\"\" width=\"974\" height=\"377\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture2-2.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture2-2-300x116.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture2-2-768x297.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p><em>Figure 2: Root crontab entry<\/em><\/p>\n<p>Crontab allows for basic scheduling features from the OS level. The user provides both the command to execute as well as timing details down to the minute, as shown in Figure 3.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-95442 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/Picture3-2.png\" alt=\"\" width=\"974\" height=\"275\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture3-2.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture3-2-300x85.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture3-2-768x217.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p><em>Figure 3: Crontab syntax<\/em><\/p>\n<p>During the initial research, I started to fuzz the rule id field; however, because every rule name that I placed in the malicious schedule was always prepended by the \u201c\/sbin\/rtng_run_rule\u201d, I could not get anything abnormal to happen. I also noticed that a lot of characters that could be useful for command injection were being filtered.<\/p>\n<p>The following is a list of characters sanitized or filtered on input.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-95445 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-30-at-9.47.47-AM.png\" alt=\"\" width=\"624\" height=\"161\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-30-at-9.47.47-AM.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-30-at-9.47.47-AM-300x77.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p>At this point I moved on and ended up finding the template vulnerability as laid out in the <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/your-smart-coffee-maker-is-brewing-up-trouble\/\" target=\"_blank\" rel=\"noopener noreferrer\">previous blog<\/a>.<\/p>\n<h2><strong>Finding an even more simple vulnerability<\/strong><\/h2>\n<p>A few months after disclosing to Belkin, I revisited the steps to achieve this template abuse feature, in preparation for a public disclosure blog. Having the ability to write arbitrary code directly into the root\u2019s crontab is enticing, so I began looking into it again. I needed to find a way to terminate the \u201crtng_run_rule\u201d and add my own commands to the crontab file by modifying the \u201cid\u201d field. The \u201crtng_run_rule\u201d file is a shell script that directly calls a Lua script named \u201crtng_run_rule.lua\u201d. I noticed that I could send the double pipe \u201c||\u201d character but the \u201crtng_run_rule\u201d wrapper script would never return a failing return code. Next, I looked at the how the wrapper script is handling command line arguments as shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-95443 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/Picture4-2.png\" alt=\"\" width=\"974\" height=\"622\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture4-2.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture4-2-300x192.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture4-2-768x490.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture4-2-783x500.png 783w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p><em>Figure 4: rtng_run_rule wrapper script<\/em><\/p>\n<p>At this point I created a new rule: \u201c-f|| touch test\u201d. The \u201c-f\u201d is not a parsed argument, meaning it will take the \u201cBad option\u201d case, causing the \u201crtng_run_rule\u201d wrapper script to return \u201c-1\u201d. With the wrapper script returning a failing return code, the \u201c||\u201d (or) statement is initiated, which executes \u201ctouch test\u201d and creates an empty file named \u201ctest\u201d. Since I still had serial access (I explain in detail in my previous blog how I achieved this) I was able to log in to the coffee maker and find where the \u201ctest\u201d file was located. I found it in root\u2019s home directory.<\/p>\n<p>Being able to write arbitrary files and execute commands without the \u201c\/\u201d character is still somewhat limiting, as most file paths and web URLs will need forward slashes. I needed to find a way to execute commands that had \u201c\/\u201d characters in them. I decided to do this by downloading a file from a webserver I control and executing it in Ash to bypass file path sanitization characters.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-95444 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/Picture5-1.png\" alt=\"\" width=\"974\" height=\"402\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture5-1.png 974w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture5-1-300x124.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/Picture5-1-768x317.png 768w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/p>\n<p><em>Figure 5: Commands allowing for execution of filtered characters.<\/em><\/p>\n<p>Let me break this down. The \u201c-f\u201d as indicated before will cause the wrapper script to execute the \u201c||\u201d command. Then the \u201cwget\u201d command will initiate a download from my web server, located at IP address \u201c172.16.127.31.\u201d The \u201c-q\u201d will force wget to only print what it receives, and the \u201c-O -\u201c tells wget to print to STDOUT instead of a file. Finally, the \u201c| ash\u201d command grabs all the output from STDOUT and executes it as Linux shell commands.<\/p>\n<p>This way I can set up a server that simply returns a file containing necessary Linux commands and host it on my local machine. When I send the rule with the above command injection it will reach out to my local server and execute everything as root. The technique of piping wget into Ash also bypasses all the character filtering so I can now execute any command I want.<\/p>\n<h2><strong>Status with Vendor<\/strong><\/h2>\n<p>Belkin did patch the original template vulnerability and released new firmware. The vulnerability explained in this blog was found on the new firmware and, as of today, we have not heard of any plans for a patch. This vulnerability was disclosed to Belkin on February 25<sup>th<\/sup>, 2019. In accordance with our <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/threat-center\/advanced-threat-research\/disclosure.html\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability disclosure policy<\/a>, we are releasing details of this flaw today in hopes of alerting consumers of the device of the ongoing security findings. While this bug is also within the Mr. Coffee with WeMo\u2019s scheduling function, it is much easier for an attacker to leverage since it does not require any modifications to templates or rehashing of code changes.The following demo video shows how this vulnerability can be used to compromise other devices on the network, including a fully patched Windows 10 PC.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/zecx3f1sx2s\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2><strong>Key takeways for enterprises, consumers and vendors<\/strong><\/h2>\n<p>Devices such as the Mr. Coffee Coffee Maker with WeMo serve as a good reminder of the pros and cons to \u201csmart\u201d IoT. While advances in automation and technology offer exciting new capabilities, they should be weighed against the potential security concerns. In a home setting, consumers should set up these types of devices on a segmented network, isolated from sensitive network traffic and more critical devices. They should implement a strong password policy to make network access more challenging and apply patches or updates for all networked devices whenever available. Enterprises should restrict access to devices such as these in corporate environments or, at a minimum, provide a policy for oversight and management. They should be treated just the same as any other asset on the network, as IoT devices are often unmonitored pivot points into more critical network infrastructure. Network scanning and vulnerability assessments should be performed, in conjunction with a rigorous patching cycle for known issues. While the vendor has not provided a CVE for this vulnerability, we calculated a CVSS score of 9.1 out of 10. This score would categorize this as a critical vulnerability.Finally, as consumers of these products, we need to ask more of the vendors and manufacturers. A better understanding of secure coding and vulnerability assessment is critical, before products go to market. Vendors who implement a vulnerability reporting program and respond quickly can gain consumers\u2019 trust and ensure product reputation is undamaged. One goal of the McAfee Advanced Threat Research team is to identify and illuminate a broad spectrum of threats in today&#8217;s complex and constantly evolving landscape. Through analysis and responsible disclosure, we aim to guide product manufacturers toward a more comprehensive security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please&#8230;<\/p>\n","protected":false},"author":1064,"featured_media":93315,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[5683],"class_list":["post-95437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mr. Coffee with WeMo: Double Roast | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the earlier\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mr. Coffee with WeMo: Double Roast | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the earlier\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-30T16:50:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T03:59:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Quinn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Quinn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/\"},\"author\":{\"name\":\"Sam Quinn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e66d604e9acc14787d29ba40c9b0eaac\"},\"headline\":\"Mr. Coffee with WeMo: Double Roast\",\"datePublished\":\"2019-05-30T16:50:39+00:00\",\"dateModified\":\"2025-06-03T03:59:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/\"},\"wordCount\":1256,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/\",\"name\":\"Mr. Coffee with WeMo: Double Roast | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg\",\"datePublished\":\"2019-05-30T16:50:39+00:00\",\"dateModified\":\"2025-06-03T03:59:48+00:00\",\"description\":\"McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the earlier\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Mr. Coffee with WeMo: Double Roast\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e66d604e9acc14787d29ba40c9b0eaac\",\"name\":\"Sam Quinn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b7f2dd45ad7b8c848605319a8d083a87\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/quinnsa-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/quinnsa-96x96.jpg\",\"caption\":\"Sam Quinn\"},\"description\":\"Sam Quinn is a Security Researcher on the Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Sam has a focus on IOT and embedded devices with knowledge in the fields of reverse engineering and penetration testing.\",\"sameAs\":[\"http:\/\/www.linkedin.com\/in\/sam--quinn\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/sam-quinn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mr. Coffee with WeMo: Double Roast | McAfee Blog","description":"McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the earlier","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Mr. Coffee with WeMo: Double Roast | McAfee Blog","og_description":"McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the earlier","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-05-30T16:50:39+00:00","article_modified_time":"2025-06-03T03:59:48+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg","type":"image\/jpeg"}],"author":"Sam Quinn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Sam Quinn","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/"},"author":{"name":"Sam Quinn","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e66d604e9acc14787d29ba40c9b0eaac"},"headline":"Mr. Coffee with WeMo: Double Roast","datePublished":"2019-05-30T16:50:39+00:00","dateModified":"2025-06-03T03:59:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/"},"wordCount":1256,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/","name":"Mr. Coffee with WeMo: Double Roast | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg","datePublished":"2019-05-30T16:50:39+00:00","dateModified":"2025-06-03T03:59:48+00:00","description":"McAfee Advanced Threat Research recently released a blog detailing a vulnerability in the Mr. Coffee Coffee Maker with WeMo. Please refer to the earlier","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/web-page-generic-javascript-code-on-computer-monitor.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mr-coffee-with-wemo-double-roast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Mr. Coffee with WeMo: Double Roast"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e66d604e9acc14787d29ba40c9b0eaac","name":"Sam Quinn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b7f2dd45ad7b8c848605319a8d083a87","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/quinnsa-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/quinnsa-96x96.jpg","caption":"Sam Quinn"},"description":"Sam Quinn is a Security Researcher on the Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Sam has a focus on IOT and embedded devices with knowledge in the fields of reverse engineering and penetration testing.","sameAs":["http:\/\/www.linkedin.com\/in\/sam--quinn"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/sam-quinn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1064"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=95437"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95437\/revisions"}],"predecessor-version":[{"id":214990,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95437\/revisions\/214990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93315"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=95437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=95437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=95437"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=95437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}