13 May 2026 / 7 minutes of reading
You pick up a smart plug on sale for a few euros. It has a nice app, measures power consumption and can turn off the coffee maker remotely. Great. But the moment price becomes the top priority, security drops far below the line. For manufacturers of cheap IoT devices, security is an extra cost that would “unnecessarily” raise the retail price for the consumer.
We need to ask an important question. Are these devices truly intelligent, or do they simply execute basic logic? In most cases it is a straightforward set of rules such as: “If it is six o’clock in the evening, switch off the plug.” This functionality says nothing about how the device is protected against external interference.
At Citadelo we have been conducting penetration tests of IoT devices for years. Almost every device contains at least one vulnerability classified as high or critical. The most common issues we encounter are the same five problems:
Security analysts look at these devices in a completely different way from the average user. They want to know, for example:
That last point is the decisive one. Many devices automatically switch to their own access-point mode when they lose connection – often without a password, to allow you to reconfigure them. An attacker can thus turn your light bulb into an entry point to your home network.
A major risk that rarely gets talked about is buying this kind of tech second-hand. A used device may already be compromised. The previous owner, or someone who had access to it, could have injected malicious code into its firmware. A simple factory reset may not be enough. You could be buying a device that starts sending information about your network to an unknown third party from the very first moment. At Citadelo we therefore recommend investing in new, reputable devices rather than saving money here.
Let’s try a small thought experiment. Would you allow a modern robot vacuum with a camera into a strictly guarded military facility or a bank? If your answer is no, ask yourself why you let it roam freely around your bedroom or living room.
You might wonder what a vacuum cleaner needs a camera for. The technical answer is innocent enough: it is a sensor that evaluates position and maps the space to make cleaning more efficient. The critical risk, however, lies in where that data is processed. Does it happen locally on your vacuum? Or is a map of your flat and a video recording being sent to remote servers in a country you may never have heard of?
Smart cameras have the same problem. The convenience of checking from your phone whether everything is fine at home comes at the cost of the risk that a stranger is watching the same feed. Although these claims are sometimes difficult to prove, this is data that can reveal our private lives, our behaviour and our daily routines.

According to the SonicWall 2024 Mid-Year Cyber Threat Report, the number of IoT malware attacks rose by 107 % in the first half of 2024. The average IoT device was under active attack for 52.8 hours. Attackers use compromised devices to build botnets that then carry out mass attacks against banks or large online services.
Five key steps:
These steps ensure that even if an attacker breaks into your smart plug, all they see in the system is another light bulb. They will not reach your computer with your photos, your work, or your bank account access. Smart technology makes an excellent servant but can be a dangerous master. Before you add another device to your home, ask yourself whether the convenience is worth the risk.
A smart home is not a bad technology. It simply requires a grown-up user. One who knows that every connected device is, first and foremost, a computer. And every computer can be exploited.
If you manufacture, distribute or deploy IoT devices in a corporate environment, IoT penetration testing is something that should be on your list before a product goes to market – not after the first incident. At Citadelo we have years of experience in this area, from firmware analysis and reverse engineering through hardware interface testing to cloud infrastructure audits.
All news