VARIoT news about IoT security
Trust: 3.5 Fetched: Feb. 17, 2026, 9:19 a.m., Published: Feb. 16, 2026, 2:39 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:17 a.m., Published: Jan. 25, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 17, 2026, 9:17 a.m., Published: Feb. 11, 2026, 5 p.m. | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 4.75 Fetched: Feb. 17, 2026, 9:16 a.m., Published: Feb. 10, 2026, 5:51 p.m. | Vulnerabilities: command injection |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:16 a.m., Published: Feb. 16, 2026, 7:41 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 17, 2026, 9:15 a.m., Published: Feb. 17, 2026, midnight | Vulnerabilities: request forgery |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 17, 2026, 9:14 a.m., Published: Feb. 12, 2026, midnight | Vulnerabilities: information disclosure, authentication bypass, code execution... |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Feb. 17, 2026, 9:14 a.m., Published: Feb. 17, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
Trust: 4.0 Fetched: Feb. 17, 2026, 9:13 a.m., Published: Feb. 16, 2026, midnight | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 17, 2026, 9:13 a.m., Published: Feb. 16, 2026, 6:29 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 17, 2026, 9:11 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 15, 2026, 9:45 a.m., Published: Feb. 14, 2026, 4:15 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 15, 2026, 9:42 a.m., Published: Feb. 3, 2026, midnight | Vulnerabilities: privilege escalation, improper access control, authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 15, 2026, 9:36 a.m., Published: Feb. 10, 2026, 10:24 a.m. | Vulnerabilities: code execution, authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 15, 2026, 9:35 a.m., Published: Feb. 26, 2026, midnight | Vulnerabilities: traffic interception, memory corruption |
| Affected products | External IDs | ||||||||||||||||
|
Trust: 4.75 Fetched: Feb. 15, 2026, 9:35 a.m., Published: Feb. 12, 2026, 10:07 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 15, 2026, 9:33 a.m., Published: Feb. 14, 2026, 1:29 p.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 15, 2026, 9:32 a.m., Published: Feb. 16, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
Trust: 3.0 Fetched: Feb. 15, 2026, 9:31 a.m., Published: Feb. 14, 2026, 4:15 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 15, 2026, 9:30 a.m., Published: Feb. 9, 2026, 9:39 a.m. | Vulnerabilities: command injection, code execution, os command injection |
| Affected products | External IDs | ||||
|