This video depicts the exploitation of buffer overflows in three successive D-Link webcams. The exploit and the callback from the second and third are tunneled through the nodes that came before them. The third webcam pops a connect-back shell that is tunneled through the first two webcams back to the exploit host. The payloads are dynamically generated for each host. I developed the MIPS Linux payloads and the framework. Craig Heffner discovered the vulnerability and developed the exploit.