If it is Client VPN software: Configure it.
If it is Router VPN software with admin access: Configure it.
if it is Router VPN software without admin access: Disconnect WiFi on the device and use cellular data with a configurable VPN client on the device.
This behavior has been noted in the past. Any loss in connectivity with the credentialing server, for whatever reason, will result in the preloaded app timeout message saying it is a username and password issue. It would be nice for the app to indicate “No Connection” or “Access Blocked”. Perhaps this would be a good #wishlist request.
I have much more confidence in Wyze Security knowing they have restricted the use of VPN Services for the obvious reasons. It means they are taking these server attacks seriously and safeguarding my personal data, the same as they are doing by implementing the 2FA requirement.
VPN software and services were great when they first started several decades ago before bad actors found a way to use that good technology for nefarious purposes. Now, because of their misuse, they have become suspect as a means to gain access from regions that would have otherwise been blocked.
VPN Services allow for very simple Geospoofing. A Credential Stuffing or Brute Force Hacker in a region IP blocked by Wyze and known for frequent server attacks could very easily use a VPN Service to make it look like they were accessing the Wyze Server from anywhere else in the world, to include any IP region allowed by Wyze. It’s really hard to block the hackers when you can no longer tell where they are. Instead, the tool they use to get in, the Geospoofing VPN, is blocked.
There are many here using the Wyze app behind both Client and Router VPNs that are able to successfully access their accounts and cams because the VPNs are configured such that they pass the Wyze Security requirement for IP origin and Geolocation. This is because the VPN is configured such that it does not mask, hide or spoof the device origin IP location. If you are on a network that refuses to be configured as such, I would seriously suggest a different network. If that is an absolute impossibility, the only solution is to work directly with Wyze Security to verify the VPN and Network for access to your account while on that network.
Is it Wyze implementing these security measures causing the issue or is it the bad actors using VPNs to attack the Wyze Servers, thereby making VPN use suspect, that has caused this situation? VPNs are on the user side, not on the Wyze side. Would you let someone into your house who you don’t know and is wearing a disguise? I’m certainly glad Wyze doesn’t.
I will continue to advocate for Wyze implementing effective security protocols to protect my data.