Research Blog
Stay up to date with the newest security advisories, vulnerability reports, and platform developments—keeping your products secure and compliant.
Featured research articles
All research articles
Advisory: Western Digital My Cloud Pro Series PR4100 RCE
The IoT Inspector Research Lab uncovered a command injection vulnerability on Western Digital My Cloud Pro Series PR4100.
How-To: Extracting Decryption Keys for D-Link
Find out how the IoT Inspector Research Lab extracted an encryption key for a subset of D-Link routers - in particular the D-Link DIR-X1560.
Advisory: Cisco ATA19X Privilege Escalation and RCE
We found lacking user privilege separation enforcement and post-authentication command injection remote code execution within Cisco ATA19X firmware.
Swimming Upstream: Uncovering Broadcom SDK vulnerabilities from bug reports
IoT Inspector identified security vulnerabilities affecting the UPnP implementation of Broadcom’s SDK that affect vendors such as Cisco or Linksys.
Advisory: Multiple issues in Realtek SDK affect hundreds of thousands of devices down the supply chain
At least 65 vendors affected by severe vulnerabilities that enable unauthenticated attackers to fully compromise the target device.
Advisory: Cisco RV34X Series - Privilege Escalation in vpnTimer
IoT Inspector detected a rare security vulnerability in Cisco's RV34X Series. Read the full root analysis on the blog!
Advisory: Multiple Issues in Libre Wireless LS9 Modules - And the Problem with Third Party Products
IoT Inspector detected security vulnerabilities in the Gigaset L800HX smart speaker, which is actually based on a third party module (Libre Wireless LS9).
check out white papers
Explore in-depth whitepapers on cybersecurity and compliance, designed to strengthen your product’s security and compliance.
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.