VARIoT news about IoT security
Latest news
The news are found with our scripts for filtering search results.
Additional information about vulnerabilities, affected products and external
identifiers are obtained with NLP and custom filters from found news.
Trust: 3.25 Fetched: Feb. 3, 2026, 10 a.m., Published: Jan. 14, 2026, 8:15 p.m. | Vulnerabilities: command injection |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 3, 2026, 9:59 a.m., Published: Jan. 29, 2026, 10:13 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||
|
Trust: 3.75 Fetched: Feb. 3, 2026, 9:59 a.m., Published: May 3, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.25 Fetched: Feb. 3, 2026, 9:58 a.m., Published: Jan. 28, 2026, 12:10 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202505-1884,
VAR-202505-1034,
VAR-202505-1415,
VAR-202505-1414 Trust: 5.5 Fetched: Feb. 3, 2026, 9:58 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: command injection, authentication bypass, buffer overflow |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||
|
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:58 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: authentication bypass, code execution |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-201905-0853 Trust: 5.5 Fetched: Feb. 3, 2026, 9:57 a.m., Published: Jan. 9, 2026, 10:56 a.m. | Vulnerabilities: file upload vulnerability, file inclusion, code injection... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202304-2073 Trust: 5.5 Fetched: Feb. 3, 2026, 9:56 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: command injection, authentication bypass, code execution |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 4.75 Fetched: Feb. 3, 2026, 9:56 a.m., Published: Jan. 28, 2026, 10:18 a.m. | Vulnerabilities: improper access control, authentication bypass, privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 3, 2026, 9:56 a.m., Published: Feb. 2, 2026, 9:27 a.m. | Vulnerabilities: command injection, service disruption |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-201902-0454,
VAR-201902-0427 Trust: 5.5 Fetched: Feb. 3, 2026, 9:55 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: path traversal, authentication bypass, code execution... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 5.0 Fetched: Feb. 3, 2026, 9:54 a.m., Published: Feb. 2, 2026, 6:16 p.m. | Vulnerabilities: command injection, os command injection |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 3, 2026, 9:54 a.m., Published: Jan. 3, 7992, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 3, 2026, 9:53 a.m., Published: Feb. 1, 2026, 1:10 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 3, 2026, 9:53 a.m., Published: Feb. 3, 2026, 5:09 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:52 a.m., Published: Feb. 3, 2026, 1:43 p.m. | Vulnerabilities: default credentials, command execution, denial of service... |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: Feb. 3, 2026, 9:52 a.m., Published: Feb. 1, 2026, 10:14 a.m. | Vulnerabilities: privilege escalation, information disclosure, denial of service... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:52 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: path traversal, authentication bypass, certificate validation vulnerability |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:51 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: authentication bypass, command execution |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 5.75 Fetched: Feb. 3, 2026, 9:51 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: authentication flaw, authentication bypass, feature bypass... |
| Affected products | External IDs | ||||||||
|
|