VARIoT news about IoT security
Trust: 4.25 Fetched: Jan. 28, 2026, 9:21 a.m., Published: Jan. 28, 7975, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: Jan. 28, 2026, 9:21 a.m., Published: Jan. 28, 7975, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: Jan. 28, 2026, 9:21 a.m., Published: Jan. 28, 7971, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-201809-0668 Trust: 4.75 Fetched: Jan. 28, 2026, 9:21 a.m., Published: Jan. 27, 2026, 2:54 p.m. | Vulnerabilities: feature bypass, security feature bypass, authentication bypass... |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: Jan. 28, 2026, 9:18 a.m., Published: Jan. 27, 2026, 6:51 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-201404-0592 Trust: 5.0 Fetched: Jan. 27, 2026, 7:33 p.m., Published: Jan. 19, 2026, 2:02 p.m. | Vulnerabilities: resource exhaustion |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.25 Fetched: Jan. 27, 2026, 7:32 p.m., Published: Jan. 27, 2026, midnight | Vulnerabilities: code execution |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: Jan. 27, 2026, 7:32 p.m., Published: Jan. 23, 2026, 2:18 p.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 5.75 Fetched: Jan. 27, 2026, 7:32 p.m., Published: Jan. 22, 2026, 1:29 p.m. | Vulnerabilities: code injection, code execution, command execution |
| Affected products | External IDs | ||||||||
|
|
Trust: 5.25 Fetched: Jan. 27, 2026, 7:31 p.m., Published: Feb. 7, 2024, 9:55 a.m. | Vulnerabilities: command injection, brute force attack, authentication bypass |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.0 Fetched: Jan. 27, 2026, 7:30 p.m., Published: March 9, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Jan. 27, 2026, 7:29 p.m., Published: Jan. 23, 2026, 7:14 a.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.75 Fetched: Jan. 27, 2026, 7:29 p.m., Published: Jan. 27, 2025, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 6.0 Fetched: Jan. 27, 2026, 7:28 p.m., Published: Jan. 22, 2026, 2:49 a.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.75 Fetched: Jan. 27, 2026, 7:26 p.m., Published: Jan. 23, 2026, 4:16 a.m. | Vulnerabilities: command injection, code execution |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Jan. 27, 2026, 7:25 p.m., Published: Jan. 22, 2026, 8:34 a.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
Trust: 4.75 Fetched: Jan. 27, 2026, 7:25 p.m., Published: Jan. 20, 2026, 1:24 p.m. | Vulnerabilities: authentication vulnerability, authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Jan. 27, 2026, 7:24 p.m., Published: Jan. 14, 2026, 6:16 p.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Jan. 27, 2026, 7:24 p.m., Published: Jan. 23, 2026, 4:16 a.m. | Vulnerabilities: command injection, code execution |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Jan. 27, 2026, 7:24 p.m., Published: Jan. 23, 2026, 4:16 a.m. | Vulnerabilities: command injection, code execution |
| Affected products | External IDs | ||||
|