VARIoT news about IoT security
Latest news
The news are found with our scripts for filtering search results.
Additional information about vulnerabilities, affected products and external
identifiers are obtained with NLP and custom filters from found news.
Trust: 5.25 Fetched: March 4, 2026, 9:28 a.m., Published: Feb. 17, 2026, 12:33 p.m. | Vulnerabilities: use after free, code execution |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 5.75 Fetched: March 4, 2026, 9:27 a.m., Published: Feb. 12, 2026, 6 p.m. | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 3.0 Fetched: March 4, 2026, 9:27 a.m., Published: Feb. 27, 2026, 3:05 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: March 4, 2026, 9:26 a.m., Published: March 4, 2026, 2:42 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.75 Fetched: March 4, 2026, 9:26 a.m., Published: March 3, 2026, 7:08 a.m. | Vulnerabilities: integer overflow, privilege escalation, code execution... |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: March 4, 2026, 9:24 a.m., Published: March 4, 2026, midnight | Vulnerabilities: integer overflow, memory corruption |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: March 4, 2026, 9:22 a.m., Published: March 3, 2026, 6:25 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||||||||||
|
Trust: 4.5 Fetched: March 4, 2026, 9:22 a.m., Published: March 3, 2026, 7:15 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||||||||||
|
Trust: 3.0 Fetched: March 4, 2026, 9:21 a.m., Published: Feb. 27, 2026, 9:16 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: March 4, 2026, 9:19 a.m., Published: March 3, 2026, 6:48 p.m. | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.0 Fetched: March 4, 2026, 9:18 a.m., Published: Feb. 26, 2026, 2:45 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.75 Fetched: March 4, 2026, 9:17 a.m., Published: - | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||
|
|
Trust: 5.25 Fetched: March 4, 2026, 9:16 a.m., Published: March 3, 2026, midnight | Vulnerabilities: default credentials, default password |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 3.75 Fetched: March 4, 2026, 9:15 a.m., Published: March 3, 2026, 6:10 p.m. | Vulnerabilities: directory traversal |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-202602-3258 Trust: 4.25 Fetched: March 4, 2026, 9:14 a.m., Published: Feb. 27, 2026, midnight | Vulnerabilities: authentication bypass, denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202209-1914,
VAR-202602-3258 Trust: 4.75 Fetched: March 4, 2026, 9:13 a.m., Published: Feb. 25, 2026, 6:51 p.m. | Vulnerabilities: privilege escalation, authentication bypass |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 5.5 Fetched: March 4, 2026, 9:12 a.m., Published: March 3, 2026, 8:57 a.m. | Vulnerabilities: integer overflow, privilege escalation, memory corruption |
| Affected products | External IDs | ||||||||
|
|
Trust: 6.0 Fetched: March 4, 2026, 9:12 a.m., Published: March 3, 2026, 10:03 a.m. | Vulnerabilities: memory corruption, integer overflow, denial of service... |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.0 Fetched: March 4, 2026, 9:11 a.m., Published: March 2, 2026, 10:20 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 5.75 Fetched: March 3, 2026, 9:47 a.m., Published: - | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|