VARIoT news about IoT security
Trust: 5.0 Fetched: Feb. 27, 2026, 9:43 a.m., Published: Feb. 23, 2026, 1:42 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 27, 2026, 9:42 a.m., Published: Feb. 27, 2026, 7:19 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 27, 2026, 9:42 a.m., Published: Feb. 26, 2026, 11:08 p.m. | Vulnerabilities: command execution, command injection |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 27, 2026, 9:42 a.m., Published: Feb. 27, 2026, 2:16 a.m. | Vulnerabilities: os command injection, code execution, command injection |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 27, 2026, 9:41 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 4.0 Fetched: Feb. 27, 2026, 9:41 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||||||
|
Trust: 6.75 Fetched: Feb. 27, 2026, 9:40 a.m., Published: Feb. 25, 2026, 5:25 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||
|
|
Trust: 4.25 Fetched: Feb. 27, 2026, 9:40 a.m., Published: Feb. 27, 2026, 8:55 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 27, 2026, 9:39 a.m., Published: Feb. 26, 2026, 10:22 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
Trust: 5.75 Fetched: Feb. 27, 2026, 9:38 a.m., Published: Feb. 25, 2026, 5:25 p.m. | Vulnerabilities: denial of service, kernel panic |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 27, 2026, 9:37 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 5.0 Fetched: Feb. 27, 2026, 9:37 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
Trust: 5.0 Fetched: Feb. 27, 2026, 9:36 a.m., Published: Feb. 25, 2026, 8:28 p.m. | Vulnerabilities: command execution, code execution, command injection |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-201205-0305 Trust: 6.25 Fetched: Feb. 27, 2026, 9:35 a.m., Published: Feb. 26, 2026, midnight | Vulnerabilities: path traversal, command injection, parameter injection... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 27, 2026, 9:34 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: command injection |
| Affected products | External IDs | ||||||||||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-202602-3258,
VAR-202209-1914 Trust: 4.5 Fetched: Feb. 27, 2026, 9:34 a.m., Published: Feb. 25, 2026, 4:13 p.m. | Vulnerabilities: path traversal |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 27, 2026, 9:33 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 5.0 Fetched: Feb. 27, 2026, 9:33 a.m., Published: Feb. 25, 2026, 3:59 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-202602-3258,
VAR-202209-1914 Trust: 5.0 Fetched: Feb. 27, 2026, 9:32 a.m., Published: Feb. 25, 2026, midnight | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202602-3258 Trust: 5.0 Fetched: Feb. 27, 2026, 9:32 a.m., Published: Feb. 25, 2026, 6:51 p.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||||||
|
|