A former student at KTH Royal Institute of Technology has demonstrated how a popular children’s smartwatch can be fully compromised over the internet. In his thesis, “Ethical Hacking of a Smartwatch for Kids: A Hacker’s Playground,” Gustaf Blomqvist conducted an ethical security assessment of a widely sold kids’ smartwatch and found what he describes as severe security flaws.
The device, identified in Swedish media as the MyFirst Fone R1s by MyFirst, exposed an insecure network service directly to the internet. By scanning for devices, an attacker could identify watches and take complete control of them remotely.
According to the findings, an attacker could access the camera and microphone, eavesdrop on surroundings, read and manipulate text messages, send arbitrary messages, and potentially use the device in denial-of-service attacks. In total, 17 vulnerabilities were discovered.
Blomqvist also found preinstalled malicious code on the watch. The device reportedly connected periodically to a remote server and transmitted detailed information about its contents. The update mechanism for that code was itself vulnerable, making it possible to install additional malicious software.
Children’s smartwatches are marketed primarily as safety devices so that parents can stay in contact with their children. However, the research suggests these products may introduce serious privacy and security risks instead.
Blomqvist says he reported the vulnerabilities to the manufacturer and initially received instructions on where to submit the details, but after that communication stopped. Pontus Johnson, professor of cybersecurity at KTH, commented that many software-based systems remain highly vulnerable and that smaller manufacturers may lack the resources to properly address security issues.
The EU Cyber Resilience Act introduces mandatory cybersecurity requirements for connected products, but full enforcement will not take effect until 2027.
Sources: kth.se, expressen.se
After skimming through the attacks performed in this research, and checking every mention of the word "internet", all I got was a section with a hypothetical scenario where the watch has a publicly reachable IPv4 address. Suffice to say, that is really quite unlikely, certainly in my experience at least.
It did also talk about bundled malware, so I guess that's bad enough, but is all IoT research like this? Always sounded to me like you kinda need to already have a foot in the door for these, and this paper didn't dispel that notion for me at all.
Same professor, Pontus Johnson, is mentioned that story.
Digging into the paper, the significant finding (RCE) is achieved via:
A payload was written which installs a reverse shell backdoor for root persistence. The payload was sent from a computer hosting a Wi-Fi to which the watch was connected, to ensure the watch had a reachable IPv4 address. The program ncat was used both to send the payload to the watch's network service, and to catch reverse shell connections.
So if i understand this- it requires the watch being connected to a compromised AP. Anyone get a different read?
the source linked in the article is dead, and I only see that AI slop comment here
-- MyFirst Fone R1, singapore
funny that it's called my first, find my first upon your device, haha
I've seen larger firms that have come to own some software like this from buyouts and on the first analysis they'll find hundreds of shockingly easy exploits like RCE's in them.
Along with this I've seen the number of software vulns reported by closed source software is no where close to what they find and fix silently at a huge number of companies.
The easiest source of this is local network attacks, and it's not that unusual. In this case you could imagine a teacher at school who knows how to use Metasploit.
It doesn't seem like it has to be local network, though, the computer just has to receive the packet somehow. So for example if the watch loads a website or connects to some service on the internet (firmware updates, cloud sync, telemetry, whatever), an attacker could try to receive/intercepts/redirect that traffic and serve the payload through that channel.
You might need the watch has no certificate pinning or weak certificate validation if it's using TLS but IoT devices often skip TLS.
Let me know if I'm misunderstanding the quote.
> In this thesis, welldocumented grey-box ethical hacking is conducted of the network service and firmware attack surfaces of the children’s smartwatch myFirst Fone R1s.
Either vendor might see the flaw as low-severity. So what if someone can send packets? So what if someone already on the local network can hack the camera? But combine them and you're pwned.
In theory I should be able to take a modern browser/device over a completely compromised router and either be safe, or have my device tell me "holy shit, something is wrong".
The days of local trust should be long gone by now.
Attacker reachable, presumably? Like from a hacked cable modem or wifi router?
Or one of your other IoT / smart home devices / malware on your PC is doing local network reconnaissance? Connecting this device to a public wifi? Or just a bad neighbour who hijacks your SSID? This smells of "I'm secure because I'm behind a NAT" which conveniently ignores the couple dozen other paths an adversary could take.
> The watch had an insecure network service that anyone could access via the internet.
Why is that? Are the cellular carriers blocking access?
========
I can materialize that smell for you, you're indeed more secure because you're behind NAT. Admitting this does not necessarily entail:
- suggesting that it's a good security solution
- suggesting that it's a security solution to begin with
- suggesting that it somehow prevents all avenues of remote exploitation
What it does do is make these stories sound a lot less dramatic. Because no, John Diddler is not going to be able to just hop on and get into your child's smartwatch to spy on them from the comfort of their home on the other side of the world at a whim, unlike these headlines and articles suggest at a glance. Not through the documented exploitation methods alone anyways, unless my skim reading didn't do the paper justice.
Remaining remote exploitation avenues do include however:
- the vendor getting compromised, and through it the devices pulling in a malicious payload, making them compromised (I guess this kinda either did happen or was simulated in the paper, but this is indirect and kind of benign anyways; you implicitly trust the vendor every time you apply a software update since it's closed source)
- the vendor being a massive (criminal?) doofus and just straight up providing a public or semi-public proxy endpoint, with zero or negligent auth, through which you can on-demand enumerate and reach all the devices (this is primarily the avenue I was expecting, as there was a car manufacturer I believe who did exactly this)
- peer to peer networking shenanigans: not sure what's possible there, can't imagine there not being any skeletons in the closet, would have been excited to learn more
List not guaranteed complete. But this is the kinda stuff I'd be expecting when I see these headlines.
Yes, it's an exploit. It should be fixed. But the endless hyperventilating over fringe exploits mostly has the effect that people now ignore all security conversations.
Carrier-grade NAT (CGN or CGNAT), also known as large-scale NAT (LSN), is a type of network address translation (NAT) used by Internet service providers (ISPs) in IPv4 network design. With CGNAT, end sites, in particular residential networks, are configured with private network addresses that are translated to public IPv4 addresses by middlebox network address translator devices embedded in the network operator's network, permitting the sharing of small pools of public addresses among many end users. This essentially repeats the traditional customer-premises NAT function at the ISP level.
Having said that, NAT isn’t a firewall.
So I agree that the watch would likely be behind NAT (for IPv4), I just disagree with the statement that ISPs usually put their customers behind cgnat.

Gustaf Blomqvist discovered a serious vulnerability in a smartwatch designed for children. (Photo: Private)
Published Mar 04, 2026
The smartwatch for children that Gustaf Blomqvist hacked in his thesis turned out to be a security disaster. The watch had an insecure network service that anyone could access via the internet.
”As an attacker, you can then take complete control of the watch and use everything it has. There are lots of scenarios where the watch can become a security risk and where it can be used for denial-of-service attacks, which is a major social problem,” he says.
In his thesis, ”Ethical hacking of a Smartwatch for Kids: A Hacker's Playground” , Gustaf Blomqvist demonstrates how easy it is to hack a smartwatch for children. Smartwatches for children have been hacked before, so Gustaf Blomqvist chose a watch that was different from those that had been hacked previously.
He also based his choice on several criteria: the watch had to be popular and have a lot of functionality, as this meant there were more attack surfaces. Smartwatches for children are also sold with safety as a key selling point, so parents can feel secure and stay in touch with their children.
"At the beginning of my work, I found out what was inside the watch, what hardware and systems it had. I also drew inspiration from other hacked watches to understand what potential vulnerabilities might exist," he explains.
When hacking, you need to map out the system, understand how it works, and how you can interact with it. This information serves as the basis for identifying any weaknesses that may exist. Once the weaknesses have been identified, they are prioritised, checked for accuracy and combined as necessary.
”Hacking may seem like magic, but it's all about technology, and as a hacker, you need to have a good technical understanding of systems,” he says.
Gustaf Blomqvist found a serious vulnerability in an attack surface that no one had previously examined, and also gained access to the camera, microphone, and speakers. He was even able to send messages and eavesdrop on the surroundings.
‘This shows that there is still a security problem with these watches that are intended for use by children,” he says.
Pontus Johnson, professor of network and systems engineering, believes that what Gustaf Blomqvist's thesis reveals is serious.
”Society at large needs to understand how vulnerable software-based systems are and how difficult it is to secure them. The really serious thing is that millions of other systems are just as vulnerable and that our digital infrastructure, even the critical parts, suffer from an incredible number of vulnerabilities,” he says.
Text: Emelie Smedslund ( emeliesm@kth.se )