According to cybersecurity firm Securi, Brenz was first spotted distributing malware back in 2009 before being shut down, but reemerged in 2011. Compromised domains link to the address through malicious iFrames for the purpose of distributing malware hosted on the website.
VirusTotal recognizes the web domain as a malicious source and scans reveal that Trojans and viruses may be hosted by Brenz.pl.
If the device's firmware links to this domain, malware can be downloaded and installed, potentially leading to unlawful surveillance and data theft.
The problem was also recently brought up in a forum post on the SC10IP firmware, which is used in commercial products and also links to Brenz.pl.
Threats do not just come from dodgy social media links, phishing campaigns or social engineering -- firmware can host malware, too.
The take-home from this is that any device, especially when it contains networking or Internet capabilities, can harbour threats to personal safety and data security, and while the average person is unlikely to do a full-scale code search, checking reviews and alerts for such products online is worthwhile -- even if the platform is trusted.
"Amazon stuff can contain malware," Olsen said.
ZDNet has reached out to Urban Security Group and will update if we hear back.