VARIoT news about IoT security
Trust: 4.5 Fetched: Feb. 8, 2026, 9:34 a.m., Published: - | Vulnerabilities: resource exhaustion, memory leak |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 3.0 Fetched: Feb. 8, 2026, 9:34 a.m., Published: Feb. 4, 2026, 11:08 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 8, 2026, 9:31 a.m., Published: Feb. 10, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||||||||||
|
Trust: 4.5 Fetched: Feb. 8, 2026, 9:29 a.m., Published: Jan. 14, 2026, 11:53 a.m. | Vulnerabilities: code execution, privilege escalation, os command injection... |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 8, 2026, 9:29 a.m., Published: Jan. 30, 2026, 4:51 p.m. | Vulnerabilities: authentication bypass, bounds access vulnerability, buffer overflow |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 5.5 Fetched: Feb. 8, 2026, 9:22 a.m., Published: Jan. 13, 2026, 9:34 p.m. | Vulnerabilities: code execution, denial of service, feature bypass... |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.75 Fetched: Feb. 8, 2026, 9:20 a.m., Published: Feb. 4, 2026, 2 a.m. | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 8, 2026, 9:17 a.m., Published: Jan. 31, 2026, midnight | Vulnerabilities: memory leak |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 8, 2026, 9:16 a.m., Published: Jan. 31, 2026, midnight | Vulnerabilities: improper memory handling, memory leak |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 8, 2026, 9:16 a.m., Published: Jan. 31, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 8, 2026, 9:15 a.m., Published: Jan. 31, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 8, 2026, 9:12 a.m., Published: Feb. 8, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 8, 2026, 9:10 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 6, 2026, 9:44 a.m., Published: Jan. 6, 7994, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: Feb. 6, 2026, 9:43 a.m., Published: Jan. 6, 7993, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Feb. 6, 2026, 9:42 a.m., Published: Feb. 4, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 6, 2026, 9:40 a.m., Published: Feb. 4, 2026, 11:45 a.m. | Vulnerabilities: code execution, authentication bypass, sql injection |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 6, 2026, 9:40 a.m., Published: Feb. 5, 2026, midnight | Vulnerabilities: os command injection, command injection |
| Affected products | External IDs | ||||
|
Trust: 4.5 Fetched: Feb. 6, 2026, 9:40 a.m., Published: - | Vulnerabilities: privilege escalation, authentication bypass |
| Affected products | External IDs | ||||||||||||||||||||||||
|
Trust: 6.0 Fetched: Feb. 6, 2026, 9:39 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||
|
|