The vast majority of these "verified" feeds are not intentional broadcasts. They end up online due to:
Manually manage your network settings rather than letting the device "poke holes" in your firewall.
Never use the default login. Use a unique, complex password.
Tells Google to look for specific strings within the URL structure.
In many jurisdictions, accessing a "protected" computer system without authorization is illegal under acts like the CFAA (Computer Fraud and Abuse Act) in the US, regardless of how easy the access was. How to Secure Your Own Devices
This specific file path is a default directory for many older or unconfigured IP camera interfaces. Why Are These Cameras Exposed?