I am the author of the DblTek exploit mentioned in the article. As to the article’s concern that “ Si alguien consigue hacer una herramienta para encontrar estos dispotivios en masa, estaremos ante otro caso Mirai”, a way to discover these devices en mass already exists. https://shodan.io allows a user to search for Tcp Banners. A search for “exec /sbin/login” will show all of the vulnerable IP Phones made by DblTek. Using that exploit from GitHub, one can use a list of these IPs to send out commands to all of the phones at once. This lends itself to the possibility that these devices can (and probably will) be used in a (relatively) small-scale DDoS attack.