VARIoT news about IoT security
Trust: 3.0 Fetched: Feb. 4, 2026, 9:29 a.m., Published: Feb. 3, 2026, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 5.5 Fetched: Feb. 4, 2026, 9:27 a.m., Published: Jan. 30, 2026, 11 p.m. | Vulnerabilities: information leakage |
| Affected products | External IDs | ||||||||||||||||
|
|
Trust: 5.5 Fetched: Feb. 4, 2026, 9:25 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: code execution, authentication bypass |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 3.25 Fetched: Feb. 4, 2026, 9:24 a.m., Published: Jan. 4, 7992, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Related entries in the VARIoT vulnerabilities database:
VAR-201910-0902 Trust: 5.5 Fetched: Feb. 4, 2026, 9:24 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: code execution, authentication bypass |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|
Trust: 5.5 Fetched: Feb. 4, 2026, 9:24 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: code execution, buffer overflow, authentication bypass |
| Affected products | External IDs | ||||||||||||
|
|
Trust: 5.75 Fetched: Feb. 4, 2026, 9:22 a.m., Published: Jan. 30, 2026, midnight | Vulnerabilities: privilege escalation, command execution |
| Affected products | External IDs | ||||||||
|
|
Trust: 5.5 Fetched: Feb. 4, 2026, 9:21 a.m., Published: Jan. 28, 2026, 8:42 a.m. | Vulnerabilities: code execution, authentication bypass |
| Affected products | External IDs | ||||||||||||||||||||||||||||
|
|
Trust: 6.0 Fetched: Feb. 4, 2026, 9:20 a.m., Published: Feb. 3, 2026, 10:07 a.m. | Vulnerabilities: command execution |
| Affected products | External IDs | ||||||||
|
|
Trust: 3.5 Fetched: Feb. 4, 2026, 9:20 a.m., Published: Feb. 4, 2026, midnight | Vulnerabilities: sql injection, cross-site request forgery, denial of service... |
| Affected products | External IDs |
Trust: 3.75 Fetched: Feb. 4, 2026, 9:19 a.m., Published: Feb. 2, 2026, 10:29 a.m. | Vulnerabilities: feature bypass, security feature bypass |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 4, 2026, 9:18 a.m., Published: Feb. 4, 2026, midnight | Vulnerabilities: code execution, information disclosure, denial of service |
| Affected products | External IDs | ||||||||||||||||||||||||||||||||||||
|
Trust: 3.0 Fetched: Feb. 4, 2026, 9:14 a.m., Published: - | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 3.5 Fetched: Feb. 3, 2026, 10:04 a.m., Published: Jan. 26, 2026, 8:54 a.m. | Vulnerabilities: command execution |
| Affected products | External IDs | ||||||||
|
Trust: 4.0 Fetched: Feb. 3, 2026, 10:04 a.m., Published: Feb. 3, 2026, 2:26 a.m. | Vulnerabilities: certificate validation vulnerability |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 3, 2026, 10:04 a.m., Published: Jan. 3, 7994, midnight | Vulnerabilities: - |
| Affected products | External IDs | ||||
|
Trust: 4.0 Fetched: Feb. 3, 2026, 10:03 a.m., Published: - | Vulnerabilities: privilege escalation |
| Affected products | External IDs | ||||
|
Trust: 5.0 Fetched: Feb. 3, 2026, 10:03 a.m., Published: Feb. 3, 2026, 3:15 a.m. | Vulnerabilities: certificate validation vulnerability |
| Affected products | External IDs | ||||
|
Trust: 4.75 Fetched: Feb. 3, 2026, 10:02 a.m., Published: Jan. 3, 2026, midnight | Vulnerabilities: use after free, denial of service, information disclosure... |
| Affected products | External IDs | ||||
|
Trust: 3.25 Fetched: Feb. 3, 2026, 10 a.m., Published: Jan. 14, 2026, 8:15 p.m. | Vulnerabilities: command injection |
| Affected products | External IDs | ||||
|