VARIoT news about IoT security
Latest news
The news are found with our scripts for filtering search results.
Additional information about vulnerabilities, affected products and external
identifiers are obtained with NLP and custom filters from found news.
Trust: 5.0 Fetched: Feb. 17, 2026, 9:20 a.m., Published: Feb. 16, 2026, 9:34 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 17, 2026, 9:19 a.m., Published: Feb. 16, 2026, 9:31 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||
|
Trust: 3.5 Fetched: Feb. 17, 2026, 9:19 a.m., Published: Feb. 16, 2026, 2:39 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:18 a.m., Published: Feb. 14, 2026, 5:15 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:17 a.m., Published: Jan. 25, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 17, 2026, 9:17 a.m., Published: Feb. 11, 2026, 5 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 4.75 Fetched: Feb. 17, 2026, 9:16 a.m., Published: Feb. 10, 2026, 5:51 p.m. | Vulnerabilities: command injection |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:16 a.m., Published: Feb. 16, 2026, 7:41 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 17, 2026, 9:15 a.m., Published: Feb. 17, 2026, midnight | Vulnerabilities: request forgery |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 17, 2026, 9:14 a.m., Published: Feb. 12, 2026, midnight | Vulnerabilities: information disclosure, authentication bypass, code execution... |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Feb. 17, 2026, 9:14 a.m., Published: Feb. 17, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
Trust: 4.0 Fetched: Feb. 17, 2026, 9:13 a.m., Published: Feb. 16, 2026, midnight | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 17, 2026, 9:13 a.m., Published: Feb. 16, 2026, 6:29 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:11 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 15, 2026, 9:45 a.m., Published: Feb. 14, 2026, 4:15 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 15, 2026, 9:42 a.m., Published: Feb. 3, 2026, midnight | Vulnerabilities: privilege escalation, improper access control, authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 15, 2026, 9:36 a.m., Published: Feb. 10, 2026, 10:24 a.m. | Vulnerabilities: code execution, authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 15, 2026, 9:35 a.m., Published: Feb. 26, 2026, midnight | Vulnerabilities: traffic interception, memory corruption |
| Affected products | External IDs | ||||||||||||||||
|
Trust: 4.75 Fetched: Feb. 15, 2026, 9:35 a.m., Published: Feb. 12, 2026, 10:07 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 15, 2026, 9:33 a.m., Published: Feb. 14, 2026, 1:29 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|