#iotsecurity

Offensive Sequenceoffseq@infosec.exchange
2026-02-28

πŸ” CVE-2026-27751 (CRITICAL): SODOLA SL902-SWTGW124AS gateways (≀200.1.20) use default creds, enabling remote admin takeover. Change all passwords or restrict access ASAP! No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity #NetworkSecurity

Critical threat: CVE-2026-27751: CWE-1392 Use of Default Credentials in Shenzhen Hongyavision Technology Co., Ltd. (S
Offensive Sequenceoffseq@infosec.exchange
2026-02-28

🚨 CRITICAL: CVE-2026-27755 in SODOLA SL902-SWTGW124AS (≀200.1.20) lets attackers forge MD5-based session IDs, bypassing auth remotely. No patch yet β€” segment, restrict, monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627755 #IoTSecurity #Infosec

Critical threat: CVE-2026-27755: CWE-330 Use of Insufficiently Random Values in Shenzhen Hongyavision Technology Co.,
Offensive Sequenceoffseq@infosec.exchange
2026-02-27

CISA warns of 4 CRITICAL vulns in Gardyn Smart Gardens (Home & Studio) enabling remote, unauthenticated compromise. No CVE yet. No active exploits, but patch & segment now. Monitor updates. radar.offseq.com/threat/critic #OffSeq #IoTSecurity #Vulnerability #Gardyn

Critical threat: Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking
Offensive Sequenceoffseq@infosec.exchange
2026-02-27

⚠️ CRITICAL OS command injection in Totolink N300RH (v6.1c.1353_B20190305) β€” CVE-2026-3301. Unauthenticated remote exploit possible, with public exploit code out. Restrict access & monitor until patch released. radar.offseq.com/threat/cve-20 #OffSeq #CVE20263301 #IoTSecurity

Critical threat: CVE-2026-3301: OS Command Injection in Totolink N300RH
2026-02-26

WITH THIS $10 Aliexpress Module You can do ANYTHING?

youtube.com/watch?v=krHt08T_aqg

#vulnerability #exploit #iotsecurity

2026-02-26

Zyxel addresses critical CVE-2025-13942 RCE affecting UPnP in 4G/5G CPEs, DSL/Ethernet, Fiber ONTs, and wireless extenders. Exploitation requires WAN + UPnP enabled; Shadowserver tracks ~120k exposed devices.

Additional post-auth command-injection flaws (CVE-2025-13943, CVE-2026-1459) patched. EOL devices (VMG1312, VMG3312/13, SBG3300/3500) remain unpatched; replacement recommended.

Mitigation recommendations:
β€’ Apply firmware updates immediately
β€’ Disable unnecessary UPnP/WAN access
β€’ Monitor network exposure of legacy devices
β€’ Track patched vs. unpatched CPEs/routers in enterprise inventories

Source: bleepingcomputer.com/news/secu

How are you prioritizing critical RCE patches for network devices? Comment below and follow for in-depth threat reporting.

#NetworkSecurity #IoTSecurity #PatchManagement #RCE #RouterSecurity #CVE #ThreatIntel #Infosec #ZeroTrust #EnterpriseSecurity

Zyxel warns of critical RCE flaw affecting over a dozen routers
2026-02-26

In-Circuit eMMC Firmware Extraction - Hacking a Car Diagnostic Scanner

youtube.com/watch?v=dOP7Rz1pXwk

#cybersecurity #iotsecurity #penetrationtesting

2026-02-26

The CLAIR Model: A Synthesized Conceptual Framework for Mapping Critical Infrastructure Interdependencies [Guest Diary]

isc.sans.edu/diary/rss/32748

#cybersecurity #vulnerability #iotsecurity

Offensive Sequenceoffseq@infosec.exchange
2026-02-25

⚠️ CRITICAL: CVE-2026-26341 in Tattile Smart+, Vega & Basic (fw ≀1.181.5) β€” default creds allow admin access if device is reachable. Change passwords, restrict interface access ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #DefaultCreds #Vuln

Critical threat: CVE-2026-26341: CWE-1392 Use of Default Credentials in Tattile s.r.l. Smart+
2026-02-24

ROP the ROM: Exploiting a Stack Buffer Overflow on STM32H5 in Multiple Ways

errno.fr/Overflowing_STM32H5.h

#vulnerability #exploit #iotsecurity

2026-02-20

GitHub - olvvier/apple-silicon-accelerometer: reading the undocumented mems accelerometer on apple silicon macbooks via iokit hid

github.com/olvvier/apple-silic

#cybersecurity #iotsecurity #community

Renaud Lifchitz :verified:nono2357@infosec.exchange
2026-02-18
dan_nannidan_nanni
2026-02-17

The Bash Bunny is a covert USB attack platform built for automating penetration testing. By impersonating trusted devices like keyboards or network adapters, it lets security professionals trigger powerful payloads in seconds, often without raising suspicion.

Here is a quick breakdown of what it can do and why it is so effective πŸ˜ŽπŸ‘‡

Find high-res pdf ebooks with all my infosec related infographics at study-notes.org

Offensive Sequenceoffseq@infosec.exchange
2026-02-17

πŸ›‘ CRITICAL vuln (CVE-2026-2564) in Intelbras VIP 3260 Z IA (2.840.00IB005.0.T): Weak password recovery via /OutsideCmd enables remote attack. No user interaction needed. Restrict access, monitor, and await patch. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262564 #IoTSecurity

Critical threat: CVE-2026-2564: Weak Password Recovery in Intelbras VIP 3260 Z IA

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst