• About
  • Advertise
  • Contact
Thursday, April 16, 2026
No Result
View All Result
NEWSLETTER
iotillinois
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotillinois
No Result
View All Result
Home IoT

IoT device manufacturers missed more than 100 vulnerabilities, argues new security research

in IoT, Security
IoT device manufacturers missed more than 100 vulnerabilities, argues new security research
0
SHARES
10
VIEWS
Share on FacebookShare on Twitter

The Internet of Things (IoT) security problem is not going anywhere fast; according to new research from Independent Security Evaluators (ISE), 125 vulnerabilities were found across 13 IoT devices analysed.

The Maryland-based security firm found at least one web application vulnerability, such as cross-site scripting (XSS), operating system command injection (OS CMDi), or SQL injection (SQLi) in all of the 13 assessed devices.According to ISE, these vulnerabilities could be used by cyber-attackers to get remote access to the device’s shell or to the administrative panel.

ISE conducted its research by acquiring root shells on 12 of the devices, which allowed complete control over them. Six of these can easily get misused remotely without authentication. These devices, described as ‘highly vulnerable’ were the Asustor AS-602T, Buffalo TeraStation TS5600D1206, TerraMaster F2-420, Drobo 5N2, Netgear Nighthawk R9000, and TOTOLINK A3002RU.

ISE founder Stephen Bono, said: “We found that many of these issues were trivial to exploit and should have been discovered even in a rudimentary vulnerability assessment. This indicates that these manufacturers likely undergo no such assessment whatsoever, that the bug bounty programs they employ are ineffective, that vulnerability disclosures sent to them are not addressed, or more likely, all of the above.”

In August, an ABI Research report argued that certain industries will be ‘woefully underfunded and incredibly vulnerable to cyber-attacks’ as the IoT ecosystem grows. It said he financial, information and communication technologies, and defence industries will account for 56% of the £111 billion projected total cyber security spend in critical infrastructure in 2024.

Interested in hearing industry leaders discuss subjects like this? Attend the co-located 5G Expo, IoT Tech Expo, Blockchain Expo, AI & Big Data Expo, and Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London, and Amsterdam.

Related Stories
Premium WordPress Themes Download
Download WordPress Themes Free
Free Download WordPress Themes
Download Premium WordPress Themes Free
free online course
download intex firmware
Premium WordPress Themes Download
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
Tags: argues new security researchIoT device manufacturers missed more than 100 vulnerabilities
Next Post

IoT security essentials: Physical, network, software

Recommended

Augury scoops up cash to power the industrial IoT

Augury scoops up cash to power the industrial IoT

As IoT changes how carriers make money, Ericsson is buying new smarts

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Illinois USA

© 2024 iotillinois.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotillinois.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In