VARIoT news about IoT security
Trust: 5.0 Fetched: Feb. 1, 2026, 9:21 a.m., Published: Jan. 30, 2026, 6:42 p.m. | Vulnerabilities: code execution, code injection |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 1, 2026, 9:20 a.m., Published: Jan. 27, 2026, 5 a.m. | Vulnerabilities: information disclosure, denial of service, code execution |
| Affected products | External IDs | ||||
|
Trust: 3.75 Fetched: Feb. 1, 2026, 9:19 a.m., Published: Jan. 22, 2026, 6:44 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.0 Fetched: Feb. 1, 2026, 9:19 a.m., Published: Jan. 18, 2026, 2:35 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 1, 2026, 9:18 a.m., Published: Jan. 30, 2026, 11:43 a.m. | Vulnerabilities: code execution, authentication bypass, memory corruption |
| Affected products | External IDs |
Trust: 3.5 Fetched: Feb. 1, 2026, 9:17 a.m., Published: March 1, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
Trust: 6.0 Fetched: Jan. 30, 2026, 9:43 a.m., Published: Jan. 30, 7978, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
|
Trust: 6.0 Fetched: Jan. 30, 2026, 9:43 a.m., Published: Jan. 30, 7973, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.0 Fetched: Jan. 30, 2026, 9:42 a.m., Published: Jan. 30, 7977, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.25 Fetched: Jan. 30, 2026, 9:42 a.m., Published: Jan. 30, 7981, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.25 Fetched: Jan. 30, 2026, 9:42 a.m., Published: Jan. 28, 2026, 2:13 p.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs |
Trust: 4.0 Fetched: Jan. 30, 2026, 9:41 a.m., Published: Jan. 30, 2026, midnight | Vulnerabilities: default credentials |
| Affected products | External IDs |
Trust: 6.0 Fetched: Jan. 30, 2026, 9:39 a.m., Published: Jan. 30, 7980, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.0 Fetched: Jan. 30, 2026, 9:35 a.m., Published: Jan. 30, 2026, midnight | Vulnerabilities: code execution |
| Affected products | External IDs |
Trust: 5.5 Fetched: Jan. 30, 2026, 9:35 a.m., Published: Nov. 30, 0001, midnight | Vulnerabilities: code execution, system crash, buffer overflow |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.75 Fetched: Jan. 30, 2026, 9:34 a.m., Published: Jan. 28, 2026, 9:32 a.m. | Vulnerabilities: cross-site scripting |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Jan. 30, 2026, 9:33 a.m., Published: Jan. 29, 2026, 7:16 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Jan. 30, 2026, 9:32 a.m., Published: Jan. 30, 2026, midnight | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 6.25 Fetched: Jan. 30, 2026, 9:29 a.m., Published: Jan. 16, 2026, 6:19 p.m. | Vulnerabilities: memory overwrite |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.75 Fetched: Jan. 30, 2026, 9:28 a.m., Published: Jan. 26, 2026, midnight | Vulnerabilities: information disclosure, denial of service, authentication bypass |
| Affected products | External IDs |