VARIoT news about IoT security
Related entries in the VARIoT vulnerabilities database:
VAR-202304-2073 Trust: 5.5 Fetched: Feb. 3, 2026, 9:56 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: command injection, authentication bypass, code execution |
| Affected products | External IDs | ||||||||||||||||||||||||
|
|
Trust: 4.75 Fetched: Feb. 3, 2026, 9:56 a.m., Published: Jan. 28, 2026, 10:18 a.m. | Vulnerabilities: improper access control, authentication bypass, privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 3, 2026, 9:56 a.m., Published: Feb. 2, 2026, 9:27 a.m. | Vulnerabilities: command injection, service disruption |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-201902-0454,
VAR-201902-0427 Trust: 5.5 Fetched: Feb. 3, 2026, 9:55 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: path traversal, authentication bypass, code execution... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 3.25 Fetched: Feb. 3, 2026, 9:54 a.m., Published: Jan. 3, 7992, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 3, 2026, 9:53 a.m., Published: Feb. 1, 2026, 1:10 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 4.0 Fetched: Feb. 3, 2026, 9:53 a.m., Published: Feb. 3, 2026, 5:09 a.m. | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:52 a.m., Published: Feb. 3, 2026, 1:43 p.m. | Vulnerabilities: default credentials, command execution, denial of service... |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.5 Fetched: Feb. 3, 2026, 9:52 a.m., Published: Feb. 1, 2026, 10:14 a.m. | Vulnerabilities: privilege escalation, information disclosure, denial of service... |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:52 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: path traversal, authentication bypass, certificate validation vulnerability |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.5 Fetched: Feb. 3, 2026, 9:51 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: authentication bypass, command execution |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 5.75 Fetched: Feb. 3, 2026, 9:51 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: authentication flaw, authentication bypass, feature bypass... |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.5 Fetched: Feb. 3, 2026, 9:50 a.m., Published: Jan. 30, 2026, 4:43 a.m. | Vulnerabilities: code injection, code execution |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 3, 2026, 9:49 a.m., Published: Feb. 2, 2026, midnight | Vulnerabilities: code injection |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 3, 2026, 9:38 a.m., Published: March 18, 2025, 1:59 p.m. | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.0 Fetched: Feb. 3, 2026, 9:37 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||||||||||
|
Trust: 6.0 Fetched: Feb. 1, 2026, 9:38 a.m., Published: - | Vulnerabilities: authentication bypass |
| Affected products | External IDs | ||||||||
|
|
Trust: 6.0 Fetched: Feb. 1, 2026, 9:37 a.m., Published: Jan. 1, 7982, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
|
Trust: 6.25 Fetched: Feb. 1, 2026, 9:36 a.m., Published: Jan. 1, 7983, midnight | Vulnerabilities: denial of service |
| Affected products | External IDs | ||||||||
|
|
Trust: 4.75 Fetched: Feb. 1, 2026, 9:35 a.m., Published: Nov. 30, 0001, midnight | Vulnerabilities: code execution |
| Affected products | External IDs | ||||||||||||||||||||
|
|