Valtik Studios
Back to blog
Smart HomemediumUpdated 2026-04-17orig. 2026-03-1813 min

Smart Home Threat Model: Every Device On Your Network, Every Attack Surface

The average American home now has 22+ connected devices. TVs, doorbells, thermostats, cameras, light bulbs, appliances, fitness trackers. Each one a tiny computer with varying security postures. A practical walkthrough of smart home attack surfaces in 2026, the devices most commonly compromised, and the network segmentation approach that actually works for consumers.

TT
Tre Trebucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Pentester. Based in Connecticut, serving US mid-market.

Count the connected devices in your house

Take a walk through your living room right now. Not your living room in 2019. The one you're sitting in today. Count what's got a WiFi chip.

Smart TV. Echo or Nest Hub in the kitchen. Robot vacuum. Doorbell. Maybe a couple of outdoor cameras. Smart lights, if you went down that rabbit hole. Thermostat. Garage door opener. Maybe a smart fridge. Your phone, the spouse's phone, the kid's phone, two laptops, a tablet, a gaming console. Then the stuff you forgot. The printer. The air purifier. The bathroom scale that sends weight data to some cloud in Seattle.

The average American household ran 11 connected devices in 2019. In 2025 it's 22, per Parks Associates. Plenty of households we audit are pushing 40. Almost none of those devices get patched. Most never will.

Here's the shortlist of what a smart home actually looks like in 2026:

  • Smart TVs (1-3 per household)
  • Smart speakers and displays (Echo, Google Home)
  • Smart phones (2-3 per household)
  • Tablets (1-2)
  • Laptops (1-2)
  • Smart doorbells (Ring, Nest, Eufy)
  • Smart cameras (indoor + outdoor)
  • Smart thermostats
  • Smart light bulbs (often a dozen or more)
  • Smart locks
  • Smart garage doors
  • Smart appliances (refrigerator, oven, washer, dryer)
  • Smart vacuums (Roomba, Shark)
  • Smart plugs
  • Smart sensors (motion, water, glass-break)
  • Streaming devices (Roku, Fire TV, Apple TV, Chromecast)
  • Gaming consoles
  • Smart watches and fitness trackers
  • E-readers
  • Connected cars in the driveway (increasingly, Wi-Fi-connected)
  • Smart doorbells
  • Baby monitors
  • Connected coffee makers

Each device is a small computer. Each has varying security posture, update cadence, and privacy practices. And each is sharing your home network with everything else. Including the computer where you do banking and the phone where you store passwords.

This post is the threat model most consumers haven't done: what attackers can do with smart home device compromise, which devices are the weakest links. And the network architecture that keeps the compromise of a smart light bulb from turning into the compromise of your laptop.

Why attackers care about smart home devices

The obvious reasons and the non-obvious ones.

Obvious: surveillance

Cameras can be watched. Baby monitors can be watched. Smart speakers have microphones. Smart TVs have microphones and in some cases cameras. All of this is attack surface for stalkers, domestic abusers, and opportunistic intruders.

Obvious: privacy data

Smart home devices generate enormous data:

  • TV viewing history
  • Voice command history
  • Room occupancy patterns (from motion sensors, smart thermostats)
  • Home arrival and departure times
  • Guest presence (facial recognition on doorbells)
  • Health data (fitness trackers, smart scales)
  • Purchase patterns (smart fridges that track restocking)

Compromised or vendor-accessed, this data goes to places users didn't intend.

Less obvious: lateral movement

Where smart home attacks matter to people who don't care about smart speakers per se. Once an attacker is on your home network, they're inside your firewall. From there:

  • Your personal laptop becomes accessible (or at least scannable)
  • Shared network drives become visible
  • Home VPN endpoints become reachable
  • Connected home offices become part of the attack surface
  • Printer / NAS credentials can be stolen (often stored in plaintext on network)

A compromised smart light bulb is, by itself, mostly useless to an attacker. As a foothold for reaching your desktop where you store crypto wallet keys, it's extremely valuable.

Less obvious: botnet recruitment

Smart home devices are often included in botnets. The Mirai botnet (2016) infected hundreds of thousands of IoT devices and launched some of the largest DDoS attacks in history. Current botnets (GorillaBot, AIRASHI, and various successor operations) continue recruiting IoT devices. Your smart camera may be in a botnet right now without your knowledge.

Less obvious: ransomware staging

Ransomware groups targeting consumers have begun using smart home device compromise as initial access. Once in the home network, they move to the family PC where sentimental data (photos, documents, work materials) is stored. And deploy ransomware.

A growing pattern in 2024-2026.

The worst offenders (in 2026)

Based on published vulnerability research, bug bounty disclosures, and incident response engagements:

Category: cheap off-brand cameras and doorbells

Chinese-manufactured, white-labeled, sold on Amazon for $20-50. Typical security profile:

  • Hardcoded default credentials
  • No automatic security updates
  • Cloud services with weak authentication
  • Firmware that hasn't been updated in years
  • Telnet or SSH exposed with default credentials

Every security researcher with a budget buys a cheap camera and finds vulnerabilities within hours. These devices are effectively permanent footholds on any network they're connected to.

Brands frequently implicated: SmartSafe, WansView. And dozens of white-label brands with rotating names that all use similar underlying firmware.

Action: replace with reputable brands. Eufy (generally okay), Ring (despite its surveillance issues, decent security), Arlo, Wyze (better than cheap no-names). Spend the $30 more.

Category: smart TVs

All of them have some attack surface. Samsung, LG, Vizio, Roku. Each has had security incidents:

  • Samsung: multiple RCE vulnerabilities over the years, automatic content recognition privacy issues
  • LG: webOS vulnerabilities, unpatched devices remain in homes for years
  • Vizio: lawsuits over surveillance + security gaps
  • Roku: channel platform abuse potential

Smart TVs are particularly concerning because:

  • They're always-on (or near-always-on)
  • They have camera/microphone in some cases
  • Software updates are infrequent after 2-3 years
  • They're trusted members of home networks

Action: if the TV doesn't need internet, don't connect it. Use a dedicated streaming box (Apple TV is the most secure; Roku and Fire TV are acceptable). Keep TVs on a separate network segment.

Category: older smart thermostats, hubs, and sensors

Many smart home ecosystems are built around hubs (SmartThings, Hubitat, older Wink, older Insteon). Older hubs often:

  • Run firmware from 2019 with no updates
  • Have weak cloud authentication
  • Bridge Zigbee/Z-Wave networks to WiFi in ways that expose the protocol network
  • Have default admin credentials that users never changed

Action: hubs older than 3 years without regular firmware updates should be replaced. Modern alternatives (Home Assistant on dedicated hardware, newer SmartThings/Hubitat) have better security postures.

Category: smart baby monitors

Both because of privacy sensitivity and vulnerabilities. Baby monitors from reputable brands (Nanit, Owlet) are generally acceptable. Baby monitors from cheap brands have documented compromise history. Cases of strangers talking to infants via compromised cameras have made news repeatedly since 2015.

Action: reputable brands only. Dedicated monitor unit (not a smartphone app) where possible, so the attack surface is narrower.

Category: smart locks and garage door openers

The direct physical-security implications make these high-stakes. Documented security issues include:

  • Replay attacks on Bluetooth locks
  • Weak crypto in some Z-Wave locks
  • Cloud service compromises enabling remote unlock
  • Default codes not rotated
  • Garage door Z-Wave commands intercepted and replayed

Action: research before buying. Schlage Encode, Yale Assure, August (reputable brands with decent security track records). Pair with monitored alarm systems so compromise is detected even if the lock is bypassed.

Category: connected appliances

LG washers with cameras, Samsung refrigerators with screens, Whirlpool ovens with apps. Each has attack surface. Each has had some security issues over the years. Most users ignore software updates on appliances entirely.

Action: don't connect appliances unless you're actively using the feature. A washing machine with internet access is a trivial attacker foothold. A washing machine without internet access is a washing machine.

Category: smart plugs and bulbs

Usually low-severity individually, but two factors make them relevant:

  • Volume. Households have dozens of smart bulbs and plugs. Compromise of a few can be stepping stones to compromise of others.
  • Protocol complexity. Zigbee, Z-Wave, Matter, and Thread each have implementation bugs that affect multiple device classes.

Action: stick with major brands (Philips Hue, Lutron, TP-Link Kasa) with regular firmware updates. Avoid no-name bulbs from random Amazon listings.

The network architecture that works

The single most impactful security measure for smart home is network segmentation. Separate IoT devices from personal computers.

The basic approach: three networks

Modern home routers typically support multiple networks. The recommended architecture:

Network 1: "Main". Your laptops, phones, tablets, NAS, printer. Devices you actively use for personal or work computing. Highest trust.

Network 2: "IoT". Your smart home devices (cameras, TVs, smart bulbs, appliances, smart speakers, etc.). Lower trust. Can't reach Main network by default.

Network 3: "Guest". For visitors. Temporary access, internet-only, can't reach Main or IoT networks.

Most consumer-grade routers in 2026 support this natively. Specific routers with strong multi-network support:

  • Ubiquiti UniFi (prosumer. Requires some technical skill but capable)
  • ASUS AiMesh routers (with guest + IoT networks)
  • TP-Link Deco (mesh with segmentation)
  • Netgear Orbi (mesh with IoT support)
  • Eero (Amazon's mesh. IoT segmentation available with Eero Plus)
  • Google Nest Wifi (some segmentation capability)

Routers to avoid: those from your ISP (often limited to a single network, weak security updates). Buy your own router.

Configuration

In your router's admin interface:

  1. Create the IoT network with its own SSID and password (different from Main)
  2. Create Guest network with its own SSID and password
  3. Disable inter-network communication (so IoT devices can't reach Main devices)
  4. Disable Universal Plug and Play (UPnP). Creates firewall holes
  5. Keep DHCP on all networks but log connections

Device assignment

  • Laptops, phones, tablets, NAS, printer → Main
  • TVs, streaming boxes, smart speakers → IoT (or, if you care about privacy, disconnect entirely)
  • Cameras, doorbells, thermostats → IoT
  • Smart appliances → IoT (or disconnected)
  • Kids' tablets and game consoles → Main or IoT based on risk tolerance
  • Guests' devices → Guest

Specific segmentation concerns

Apple ecosystem: HomeKit, AirPlay, AirDrop require devices to be on the same network. If you've Apple TVs as streaming boxes and iPhones/iPads, they may need to be on Main for functionality. Consider this in your segmentation planning.

Chromecast: Google's casting protocol historically requires same-network. Newer versions support cross-network with some setup.

Smart home hubs: the hub itself should be on IoT. The hub app on your phone accesses the hub via local network (same-network required) or via cloud (cross-network works). Check your specific hub.

Printers: personal devices need printer access. Printer is a persistent device. Printers on the Main network are the common compromise. Printers often run outdated firmware. Consider: printer on Main with firmware updated, or printer on IoT with some connection difficulty, depending on your risk tolerance.

Specific device-type hardening

For each smart device:

  1. Change default credentials immediately. Every device comes with default admin credentials. Change them. Use unique passwords per device.

  1. Update firmware. Check for firmware updates at setup. Check again quarterly. Some devices update automatically. Verify it's happening.

  1. Disable unused features. If your smart speaker doesn't need to make phone calls, disable that. If your TV doesn't need to run apps, disable that.

  1. Review privacy settings. Most devices have privacy settings that reduce data collection. Enable them aggressively.

  1. Disable UPnP. Both on your router and on the device itself.

  1. Unplug devices you don't use. The cheapest security control is absent attack surface.

Cameras specifically

  • Physical covers for indoor cameras (shutters or opaque tape over lenses)
  • Motion-only recording, not 24/7
  • Cloud recording with strong authentication (unique password, 2FA)
  • Local recording with network-isolated NAS storage where possible
  • Regular review of camera activity logs
  • Annual reset / reinstall cycle to catch any persistent compromise

Smart speakers specifically

  • Voice command history deletion enabled (Alexa, Google Assistant both support this)
  • Disable "drop-in" features unless actively needed
  • Disable camera access on devices with screens
  • Physical mic mute when not in active use (especially Alexa and Google Home devices with physical mute switches)

Smart TVs specifically

  • Disable Automatic Content Recognition (ACR). See our smart TV blog post for detail
  • Disable microphone access if not using voice control
  • Disable built-in cameras (some TVs have them)
  • Log out of streaming service accounts when not in use (reduces authentication reuse risk)
  • Keep TV firmware updated

Smart doorbells specifically

  • Limit cloud storage duration to minimum needed
  • Review footage access permissions (who else can see?)
  • Disable audio recording if not needed (some jurisdictions require consent for audio recording)
  • Audit linked accounts and remove unused ones (Ring previously allowed Amazon employees broad access. Check permissions)

The update problem

A structural issue with consumer IoT: devices have 5-20 year physical lifespans but software support is 2-5 years. What happens after the vendor stops updating?

Three options:

  1. Replace the device. If it's a $30 smart bulb, fine. If it's a $400 smart lock or $3,000 appliance, less fine.
  2. Isolate the unsupported device. Put it on IoT network. Accept the risk that it may be compromised but limit lateral movement.
  3. Disconnect the device from internet. Many smart devices can work "dumb". Smart bulbs work as regular bulbs, smart fridges cool things without internet. Lose the "smart" features but keep the physical function.

For older devices you're not going to replace, option 2 or 3 are the realistic paths.

The Matter / Thread question

Matter (the IoT interoperability standard launched in 2022) and Thread (the underlying network protocol) are supposed to improve the smart home ecosystem's security posture. Early evaluation:

  • Matter's security model is better than legacy IoT. Certificate-based authentication, better credential management, required encryption.
  • Thread provides a separate RF network for devices that's isolated from WiFi. Reduces attack surface.
  • Matter certification requires devices to meet security standards (though enforcement is variable).

Practical impact: buying Matter-certified devices (or at minimum devices from major brands that support Matter) gives you better security baseline than buying random Zigbee/Z-Wave devices from cheap brands.

Not a silver bullet. Matter doesn't fix cloud-service security issues, doesn't fix vendor practices, and isn't universally adopted. But it's directionally better.

Monitoring your network

If you want to know what's on your home network:

Basic: router admin page

Most routers show connected devices. Log in to your router's admin interface, review the device list. Unfamiliar devices are investigation priorities.

Intermediate: Fing (free app)

Fing scans your network and identifies devices. Free tier is sufficient for most homes.

Advanced: Pi-hole with query logging

Pi-hole's query logs show what every device is connecting to. Unusual connections are indicators of compromise.

Prosumer: UniFi Dream Machine with IDS

Ubiquiti's UniFi Dream Machine (or Dream Router) includes IDS/IPS. Detects suspicious activity. Not perfect but better than consumer router default.

Home-network security monitoring services

  • Firewalla (hardware device, $130-$500 depending on model). Home network visibility and security
  • Bitdefender Box. Home network security device
  • Cujo (discontinued but devices may still work). Similar category

For technically engaged consumers, Firewalla is currently the best option.

Recovery: when a device is compromised

If you suspect a smart home device is compromised:

  1. Physically disconnect the suspected device from the network and power
  2. Change admin credentials on remaining devices
  3. Audit router's device list for unfamiliar connections
  4. Scan main-network computers for malware (Malwarebytes, Windows Defender full scan)
  5. Change Wi-Fi password and reconnect all trusted devices
  6. Check cloud services associated with the device. Review access logs, change passwords
  7. Factory reset the suspected device before reconnecting (if you choose to reconnect)

For significant compromise (home invasion-adjacent surveillance, stalker concern, clear evidence of breach):

  • File a police report
  • Consult with a security professional
  • Consider professional network cleanup
  • Monitor financial and identity accounts

For people in high-risk situations

If you're:

  • Domestic violence survivor with a known adversary
  • Public figure (executive, politician, journalist)
  • Person under specific stalking concerns
  • High-value target (cryptocurrency holder, high-net-worth individual)

Your smart home threat model is more demanding:

  • Audit every connected device for adversary access (especially ex-partner scenarios)
  • Remove devices with shared accounts (you and ex-partner both had Ring app access)
  • Rotate all passwords and 2FA
  • Consider factory-reset-and-reinstall of everything
  • Document what's installed for transparency with your professional advisors
  • Consider temporary disconnection of non-essential smart home features

Reach out to specialists (domestic violence tech safety consultants, executive protection firms) for situations warranting it.

The honest summary

Your home has more connected devices than you probably realize. Each one has an attack surface. Each one is one hop from your personal computer.

The single most impactful security control is network segmentation. Put IoT devices on their own network, isolate them from your main computing devices. This doesn't require expertise. Modern consumer routers support it. Setup takes an hour.

Beyond that: buy from reputable brands, change default credentials, keep firmware updated, audit your device list. And disconnect what you don't use.

The smart home ecosystem is valuable. The security trade-offs are real. The middle ground. Smart features with reasonable security hygiene. Is achievable. Most households don't bother, which is why smart home compromise keeps rising.

What Valtik does in this space

Valtik's consumer privacy consultations include home network architecture review. We:

  • Inventory your connected devices
  • Assess security posture of each
  • Design segmentation architecture appropriate to your household
  • Recommend specific device replacements where justified
  • Walk through configuration of your router

For individuals in high-risk situations, we offer confidential consultations including evidence-preservation coordination if ongoing abuse or stalking is involved. Reach out via https://valtikstudios.com or the National Domestic Violence Hotline (1-800-799-7233) for domestic-violence-specific situations.

Sources

  1. Parks Associates Smart Home Research
  2. IoT Security Vulnerabilities. ZDI
  3. Mirai Botnet Analysis. Krebs on Security
  4. IoT Device Vulnerability Research. Armis
  5. Matter / Thread Security Architecture. CSA IoT
  6. Consumer Router Security Review. Consumer Reports
  7. Home Network Segmentation. Ubiquiti Community
  8. Firewalla Network Security
  9. National Network to End Domestic Violence. Tech Safety
  10. Mozilla Privacy Not Included
smart homeiot securityhome networkconsumer cybersecurityhome automationnetwork segmentationdata privacyopsecresearch

Want us to check your Smart Home setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.