Services tab / “Shields Up” / Proceed / All Service Ports – wait for the scan to complete. All green is what you want to see.
Now go check to see if your Unplug and Play is on or off.
Go to GRC’s freeware tab / security / Unplug and Pray and run it. – Turn off your Unplug and Play.
The Ray Sharp DVR platform is particularly prone to the vulnerability. Other products included for such a potential exploit are: Swann, Lorex, URMET, KGuard, Defender, DEAPA/DSP Cop, SVAT, Zmodo, BCS, Bolide, EyeForce, Atlantis, Protectron, Greatek, Soyo, Hi-View, Cosmos and J2000. A temporary work-around someLuser presents is to disable the universal plug and play (UPNP) on routers to prevent outside devices from using the Internet to access the system remotely.