VARIoT news about IoT security
Trust: 4.0 Fetched: March 4, 2026, 9:11 a.m., Published: March 2, 2026, 10:20 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 5.75 Fetched: March 3, 2026, 9:47 a.m., Published: - | Vulnerabilities: memory corruption |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 3.75 Fetched: March 3, 2026, 9:45 a.m., Published: March 3, 2026, midnight | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||
|
Trust: 4.5 Fetched: March 3, 2026, 9:44 a.m., Published: March 2, 2026, 4:45 p.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 4.25 Fetched: March 3, 2026, 9:40 a.m., Published: Feb. 26, 2026, midnight | Vulnerabilities: command execution, arbitrary command execution |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 4.25 Fetched: March 3, 2026, 9:39 a.m., Published: March 26, 2026, midnight | Vulnerabilities: memory corruption, process crash, bounds access issue... |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 5.25 Fetched: March 3, 2026, 9:39 a.m., Published: May 3, 2026, midnight | Vulnerabilities: improper validation, information disclosure |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 4.75 Fetched: March 3, 2026, 9:39 a.m., Published: Feb. 11, 2026, 11:13 a.m. | Vulnerabilities: sql injection, weak password, authentication bypass |
| Affected products | External IDs | ||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202602-3258 Trust: 4.75 Fetched: March 3, 2026, 9:38 a.m., Published: Feb. 26, 2026, midnight | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||||||||||
|
|
Related entries in the VARIoT vulnerabilities database:
VAR-202602-3258 Trust: 3.5 Fetched: March 3, 2026, 9:35 a.m., Published: Feb. 25, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||||||
|
|
Trust: 5.0 Fetched: March 3, 2026, 9:33 a.m., Published: Feb. 11, 2026, 6:26 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: March 3, 2026, 9:32 a.m., Published: March 1, 2026, 11:02 p.m. | Vulnerabilities: buffer overflow |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: March 3, 2026, 9:31 a.m., Published: May 3, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.25 Fetched: March 3, 2026, 9:31 a.m., Published: March 17, 2026, midnight | Vulnerabilities: improper access control |
| Affected products | External IDs |
Trust: 5.0 Fetched: March 3, 2026, 9:29 a.m., Published: March 1, 2026, 4:40 a.m. | Vulnerabilities: default credentials |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: March 3, 2026, 9:27 a.m., Published: March 2, 2026, 10:36 a.m. | Vulnerabilities: buffer overflow |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: March 3, 2026, 9:26 a.m., Published: March 3, 2026, 7:18 a.m. | Vulnerabilities: privilege escalation |
| Affected products | External IDs |
Trust: 4.75 Fetched: March 3, 2026, 9:25 a.m., Published: March 2, 2026, 7:03 a.m. | Vulnerabilities: buffer overflow, privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: March 3, 2026, 9:25 a.m., Published: March 2, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: March 3, 2026, 9:24 a.m., Published: March 1, 2026, 6:58 p.m. | Vulnerabilities: command injection, pointer dereference vulnerability, service disruption |
| Affected products | External IDs | ||||
|