Family Encyclopedia >> Home & Garden

The iKettle Hack: A Wake-Up Call for Smart Home Security (Even If You Don't Own One)

Smart home gadgets promise convenience, but some stretch the concept too far. I've covered my share of questionable devices, like the web-controlled refrigerators and rice cookers in my article on 9 of the Dumbest Smart Appliances. Among them was the iKettle from Smarter Labs—a WiFi-enabled kettle that seemed more gimmick than genius.

The iKettle Hack: A Wake-Up Call for Smart Home Security (Even If You Don t Own One) iKettle 2.0 (comes with UK plug and requires US power converter). Shop Now on Amazon.

Boiling water shouldn't require internet access, yet this kettle did—and it harbored a massive security flaw that could compromise your entire WiFi network.

How the Attack Unfolded

The iKettle's vulnerability was glaringly simple to exploit. An attacker scans for a network hosting an iKettle, then sets up a rogue access point mimicking the same SSID (network name).

Once the kettle reconnects to the fake network, the attacker connects via Telnet on port 23—a dated, insecure protocol akin to SSH but without encryption. Learn more in our guide: What is Telnet and What Are Its Uses? [MakeUseOf Explains].

The device prompts for a six-digit code, often defaulting to 000000 if set up via Android. After brute-forcing or using the default, the attacker runs a command to dump settings—revealing your WiFi password in plain text and granting full network access.

Smarter Labs' Response

A Smarter Labs spokesperson confirmed a fix was imminent via the iKettle app (iOS/Android). Newer models are unaffected. In the interim, they suggested isolating the kettle on a separate router with a unique SSID—affordable options start at $10 on Amazon.

This incident underscores a harsh reality: smart devices are computers, prone to the same threats. Using Telnet on a kettle sounds absurd, but it's a stark reminder.

The iKettle Hack: A Wake-Up Call for Smart Home Security (Even If You Don t Own One)

As smart homes evolve, manufacturers must prioritize security, collaborate with researchers, and handle disclosures responsibly. See: Full or Responsible Disclosure: How Security Vulnerabilities Are Disclosed and Why Oracle Wants You to Stop Sending Them.

They also need plans for device longevity, especially post-bankruptcy—perhaps open-sourcing code like some startups.

The Pitfalls of Planned Obsolescence

Contrast this with traditional appliances. A friend's 1980s microwave from East Germany (made by a defunct company) still works flawlessly—no updates required.

The iKettle Hack: A Wake-Up Call for Smart Home Security (Even If You Don t Own One)

Dumb appliances defy planned obsolescence cycles common in consumer electronics. Read: You Will Consume: The Consumer Electronics Story. No "two-year kettle upgrade" exists in that world.

Smart devices demand ongoing patches, but developers are costly. Support eventually ends, like Windows XP in 2014 (What the Windows XPocalypse Means for You). Companies vanish too—think Silicon Graphics, Palm, or Commodore—leaving devices orphaned.

Safeguarding Your IoT Devices

The Internet of Things remains experimental, raising key questions:

The iKettle Hack: A Wake-Up Call for Smart Home Security (Even If You Don t Own One)

  • Should manufacturers guarantee security—and for how long?
  • What if they fail? Mandatory open-sourcing?
  • How can consumers protect themselves?

Until resolved, caution prevails. What are your thoughts? Share below.