Embedded Systems & Low-Level Security Intelligence

Last Updated: 2026-03-06 06:00 UTC

NEWS Critical

State-affiliated hackers set up for critical OT attacks that operators may not detect

Industrial PLC/SCADA

A report details how state-affiliated hackers, including Volt Typhoon (linked to China) and groups associated with Russia's GRU Sandworm, are actively mapping and preparing for disruptive attacks on Operational Technology (OT) networks, particularly in energy, pipeline, and industrial sectors.

Key Points:
  • State-linked groups are shifting focus from access to disruption of physical industrial processes.
  • Groups like Voltzite, Kamacite, and Electrum are actively scanning and mapping OT devices and control loops.
  • Electrum conducted a significant attack on Polish energy infrastructure, demonstrating wiper malware capabilities.
Affected: Industrial Control Systems (ICS), SCADA systems, PLCs (Programmable Logic Controllers), Energy grids, Oil and gas pipelines, Manufacturing facilities, Water utilities
NEWS High

14 old software bugs that took way too long to squash

Linux Kernel, Firmware Updates, Industrial Control Systems

This article details 14 software bugs that took significant time (years) to be identified and patched, highlighting vulnerabilities in widely used libraries and systems often found within embedded devices or legacy infrastructure.

Key Points:
  • Several vulnerabilities (PrintDemon, win32k.sys, GRUB2) directly impact boot processes or low-level system components.
  • Libpng vulnerability (CVE-2026-25646) affects image processing, crucial in many embedded systems.
  • SIGRed DNS vulnerability demonstrates a man-in-the-middle attack targeting DNS servers, often found in embedded routers and gateways.
Affected: Linux distributions (Debian, Red Hat, Ubuntu), Windows systems, Embedded devices using vulnerable libraries (Libpng, Python tarfile), Industrial control systems, Network devices (routers, gateways), Legacy embedded systems using Telnet
NEWS Critical

Disruptive By Design: Mission Critical: Protecting Operational Technology on Military Bases

Industrial & Critical Infrastructure / Military Systems

The article discusses the need to protect operational technology (OT) on military bases, highlighting vulnerabilities in legacy systems and emphasizing a shift towards more resilient architectures.

Key Points:
  • Focuses on securing OT environments, which heavily rely on embedded systems like PLCs and SCADA.
  • Addresses the challenges of integrating modern security solutions with legacy OT infrastructure often found in military bases.
  • Emphasizes the importance of a 'disruptive by design' approach to security, acknowledging that traditional perimeter defenses are insufficient.
Affected: PLCs, SCADA Systems, Industrial Control Systems (ICS), HMI Panels
NEWS High

RESOURCES

Wireless Communication (Bluetooth/BLE)

A security researcher discovered vulnerabilities in the encryption/decryption code of a proprietary protocol running on Nordic Semiconductor nRF52840 chips, potentially impacting devices utilizing this chip.

Key Points:
  • Researcher analyzed RF nodes using Nordic nRF52840 chips.
  • Discovered vulnerabilities in the encryption/decryption code of a proprietary protocol.
  • Findings shared to improve security awareness and potentially mitigate risks.
Affected: nRF52840-based devices, Devices utilizing the proprietary protocol analyzed
NEWS Medium

Reversing the RADIO – AES CCM Link in the nRF family

Wireless Communication Security

This article details the successful reverse engineering of AES CCM encryption within a proprietary protocol running on Nordic Semiconductor's nRF52840 chip, revealing vulnerabilities in the RF communication layer.

Key Points:
  • Reverse engineering of AES CCM encryption on nRF52840 chip.
  • Discovery of proprietary protocol implementation details.
  • Potential for exploitation through RF communication vulnerabilities.
Affected: nRF52840-based devices, Devices utilizing the proprietary protocol described in the article
TRANSPORTATION TRANSPORTATION Critical

IOActive Autonomous and Transportation Experience and Capabilities

Automotive ECU / Telematics

IOActive highlights their extensive experience in automotive security, particularly focusing on remote exploitation of vehicle telematics units and autonomous driving technologies.

Key Points:
  • IOActive pioneered remote attacks on vehicles through telematics units in 2015.
  • They have focused on understanding vulnerabilities in autonomous and remote-controlled technologies for 5 years.
  • The article references a previous successful attack demonstrating the feasibility of remote exploitation.
Affected: Automotive ECUs, Telematics Control Units (TCUs), Connected Car Systems
VULNERABILITY High

CVE-2026-3612: Wavlink WL-NU516U1 V240425

Smart Home Device

A command injection vulnerability in the OTA Online Upgrade functionality of the Wavlink WL-NU516U1 router allows remote attackers to execute arbitrary commands by manipulating the firmware_url argument.

Key Points:
  • Command injection vulnerability
  • Affects OTA (Over-The-Air) upgrade functionality, a critical embedded system feature.
  • Exploit is publicly disclosed and can be initiated remotely.
Affected: Wavlink WL-NU516U1 V240425 router, Embedded Linux (likely, given the cgi-bin script)
VULNERABILITY Critical

CVE-2026-28472: OpenClaw Gateway

Industrial PLC/SCADA Systems

OpenClaw gateway software, often used in industrial automation and SCADA systems, contains a critical vulnerability allowing unauthorized access by bypassing device identity checks.

Key Points:
  • The vulnerability lies in the WebSocket connect handshake within the gateway.
  • Attackers can bypass device identity checks by exploiting the presence of an authentication token without proper validation.
  • This allows attackers to potentially gain operator access, which could lead to significant disruption or control of industrial processes.
Affected: Industrial Control Systems (ICS), SCADA systems, PLCs
NEWS Info

Marvell Unveils 1.6T ZR/ZR+ Pluggable and 2-nm Coherent DSPs

Network Equipment

Marvell announced new high-speed coherent optical networking solutions, including pluggable modules and 2nm DSPs, designed to meet the increasing bandwidth and security demands of AI data center interconnects.

Key Points:
  • New 1.6T ZR/ZR+ pluggable modules
  • 2-nm coherent DSPs for data center interconnects
  • Focus on security requirements in AI applications
Affected: Data Centers, Network Switches/Routers (using Marvell components), High-performance computing infrastructure
VULNERABILITY BOOTLOADERS High

CVE-2026-28442: ZimaOS

Embedded Operating System

ZimaOS, a fork of CasaOS designed for Zima devices and x86-64 systems with UEFI, allows unauthorized deletion of internal system files via API manipulation due to improper input validation and broken access control.

Key Points:
  • ZimaOS is designed for Zima devices and x86-64 UEFI systems, indicating a focus on embedded or specialized hardware.
  • The vulnerability allows bypassing restrictions on deleting system files, potentially leading to device compromise or malfunction.
  • The root cause is improper input validation and broken access control, common low-level security flaws.
Affected: Zima Devices, x86-64 UEFI systems running ZimaOS
VULNERABILITY BOOTLOADERS High

CVE-2025-70616: Wincor Nixdorf wnBios64.sys

Point of Sale (POS) Systems

A stack buffer overflow vulnerability in the Wincor Nixdorf wnBios64.sys kernel driver allows for potential code execution, privilege escalation, or denial of service via a crafted IOCTL request.

Key Points:
  • Stack buffer overflow vulnerability in kernel driver (wnBios64.sys)
  • Vulnerability exists due to missing bounds checking on user-controlled input.
  • Exploitation requires local access and sending a crafted IOCTL request.
Affected: Wincor Nixdorf ATMs, Embedded Linux (likely), wnBios64.sys kernel driver
TRANSPORTATION TRANSPORTATION Critical

Israel Hacked Traffic Cameras in Iran

Automotive & Transportation / Surveillance Systems

Reports indicate that Israel hacked Iranian traffic camera systems to track and potentially target leadership, demonstrating a real-world application of embedded system vulnerabilities.

Key Points:
  • Traffic cameras are likely controlled by embedded systems with dedicated firmware.
  • The hack involved gaining control of these embedded devices, potentially through vulnerabilities in their software or communication protocols.
  • This highlights the security risks associated with connected infrastructure, including those reliant on embedded systems.
Affected: Traffic Camera Firmware, Network Infrastructure (connecting cameras), Embedded Operating System (likely a real-time OS)
NEWS Critical

Cisco issues emergency patches for critical firewall vulnerabilities

Network Security / Firewall Firmware

Cisco has released emergency patches for critical vulnerabilities in its Secure Firewall Management Center (FMC) and Adaptive Security Appliance (ASA) software, including 'perfect 10' vulnerabilities that allow unauthenticated root access and remote code execution.

Key Points:
  • Two 'perfect 10' vulnerabilities (CVE-2026-20079 and CVE-2026-20131) in FMC allow unauthenticated root access via authentication bypass and insecure deserialization.
  • Several other high-severity vulnerabilities (CVSS 7.2 - 8.6) are also addressed, including SQL injection and denial-of-service vulnerabilities.
  • The vulnerabilities relate to the web management interface, making them attractive targets for attackers.
Affected: Cisco Secure Firewall Management Center (FMC), Cisco Adaptive Security Appliance (ASA), Cisco Secure Firewall Threat Defense (FTD)
NEWS Info

[$] Reconsidering the multi-generational LRU

Linux Kernel

The article discusses the stalled progress and potential removal of the multi-generational LRU (MGLRU) in the Linux kernel, a critical memory management component.

Key Points:
  • MGLRU was introduced in kernel 6.1 with performance promises but has not been widely adopted.
  • Development on MGLRU is currently stalled, with some developers seeking improvements and others advocating for its removal.
  • The future of MGLRU will be discussed at the LSFMM+BPF summit.
Affected: Embedded Linux Systems, Linux-based devices
NEWS Critical

Coruna iOS exploit kit moved from spy tool to mass criminal campaign in under a year

Mobile OS Security (iOS)

A sophisticated iOS exploit kit, Coruna, initially used for commercial surveillance, has rapidly transitioned to a mass criminal campaign targeting cryptocurrency wallets, demonstrating the proliferation of high-end zero-day exploits and highlighting vulnerabilities in mobile device security.

Key Points:
  • Coruna targets iOS devices running versions 13.0 through 17.2.1.
  • The exploit kit has been used by a commercial surveillance company, a Russian espionage group (UNC6353), and Chinese cybercriminals (UNC6691).
  • The kit leverages 23 individual exploits built from WebKit remote code execution.
Affected: iOS devices (iPhone), Cryptocurrency wallet applications, Apple Notes application
VULNERABILITY Critical

CVE-2026-28536: Unspecified Device with Authentication Module

General Embedded Device

A critical authentication bypass vulnerability exists in the device authentication module, potentially compromising integrity and confidentiality.

Key Points:
  • Authentication bypass allows unauthorized access.
  • CVSS score of 9.6 indicates a critical severity.
  • The vulnerability impacts both integrity and confidentiality.
Affected: Any device utilizing a device authentication module
VULNERABILITY High

CVE-2026-29128: IDC SFX2100 Satellite Receiver

SATCOM Terminal

The IDC SFX2100 satellite receiver firmware contains multiple daemon configuration files with hardcoded, world-readable passwords allowing for potential network access and privilege escalation.

Key Points:
  • Multiple daemon configuration files (zebra, bgpd, ospfd, ripd) are world-readable.
  • These files contain hardcoded plaintext passwords, including 'enable' credentials.
  • A remote attacker can leverage these credentials to access other systems or escalate privileges on the receiver.
Affected: IDC SFX2100 Satellite Receiver
VULNERABILITY High

CVE-2026-29126: IDC SFX2100 Satellite Receiver

SATCOM Terminal

A world-writable file in the IDC SFX2100 satellite receiver allows a local attacker to escalate privileges and achieve persistence by modifying a DHCP event script executed with root permissions.

Key Points:
  • The vulnerability involves a world-writable file (/etc/udhcpc/default.script) within the device's filesystem.
  • The script is executed by BusyBox udhcpc with root privileges during DHCP events (lease acquisition, renewal, loss).
  • Successful exploitation allows for local privilege escalation and persistence.
Affected: IDC SFX2100 Satellite Receiver, Embedded Linux (likely, given the use of BusyBox and DHCP client)
VULNERABILITY High

CVE-2026-29124: IDC SFX2100 Satellite Receiver

SATCOM Terminal

The IDC SFX2100 satellite receiver contains multiple SUID root-owned binaries that allow for local privilege escalation from the 'monitor' user to root, potentially enabling attackers to gain full control of the device.

Key Points:
  • Multiple SUID root-owned binaries are present.
  • Privilege escalation vulnerability exists from 'monitor' user to root.
  • The affected device is a satellite receiver (IDC SFX2100).
Affected: IDC SFX2100 Satellite Receiver, /home/monitor/terminal, /home/monitor/kore-terminal, /home/monitor/IDE-DPack/terminal-dpack, /home/monitor/IDE-DPack/terminal-dpack2
VULNERABILITY High

CVE-2026-29122: IDC SFX2100

SATCOM Terminal

The IDC SFX2100 satellite receiver contains a vulnerable `/bin/date` utility with the setuid bit enabled, allowing local users to escalate privileges and read sensitive files as root.

Key Points:
  • The `/bin/date` utility is installed with the setuid bit.
  • This allows local privilege escalation to root.
  • Attackers can read files like `/etc/shadow` using GTFObins.
Affected: IDC SFX2100 satellite receiver, Linux-based embedded systems (likely)
VULNERABILITY High

CVE-2026-29121: IDC SFX2100

SATCOM Terminal

The IDC SFX2100 satellite receiver includes a vulnerable `/sbin/ip` utility with the setuid bit enabled, allowing local users to escalate privileges and potentially read files as root.

Key Points:
  • The `/sbin/ip` utility is installed with the setuid bit.
  • This allows local users to execute commands with root privileges.
  • GTFObins can be used to exploit this vulnerability for file reads and potentially other actions.
Affected: IDC SFX2100 satellite receiver, Embedded Linux (likely)
TRANSPORTATION TRANSPORTATION Info

Smarter Security, Leaner Budgets: IOActive & SERJON’s Approach to Cyber Optimization

Automotive ECU

The article discusses the adoption of Threat Analysis and Risk Assessment (TARA) processes within the automotive industry to meet regulatory cybersecurity requirements.

Key Points:
  • Focus on automotive industry's adoption of TARA.
  • TARA is a systematic process for identifying cybersecurity threats to vehicle systems.
  • Emphasis on aligning cybersecurity artifacts with regulatory requirements (likely referencing UNECE regulations).
Affected: Automotive ECUs, Vehicle Control Systems
NEWS High

Europa im Visier von Cyber-IdentitΓ€tsdieben

Industrial PLC/SCADA & Linux Kernel

A Darktrace report highlights a shift in attack strategies targeting European organizations, particularly those in critical infrastructure sectors like manufacturing, energy, and telecommunications. Attackers are increasingly leveraging compromised cloud accounts and exploiting vulnerabilities to gain access and move laterally within networks, often targeting privileged users.

Key Points:
  • Attackers increasingly using compromised cloud accounts and email access as initial entry points.
  • Focus on critical infrastructure sectors (manufacturing, energy, telecommunications) with groups like Lazarus and ShadowPad being prominent threats.
  • Exploitation of vulnerabilities (CVEs) is increasing, with attackers often exploiting them before public disclosure.
Affected: Industrial PLCs/SCADA systems, Microsoft Azure, Google Cloud Platform, AWS, Linux Kernel (due to CVE exploitation)
NEWS High

LeakBase marketplace unplugged by cops in 14 countries

Linux Kernel/General Cybersecurity

International law enforcement has seized LeakBase, a large online marketplace where cybercriminals buy and sell stolen data including credentials, credit card numbers, and banking information, disrupting a significant portion of the cybercrime ecosystem.

Key Points:
  • LeakBase was a major marketplace for stolen data and cybercrime tools.
  • Law enforcement in 14 countries coordinated to seize the site and arrest users.
  • The seized database contained sensitive information, including credentials and financial data.
Affected: Any system utilizing compromised credentials (potentially including embedded devices with weak authentication), Systems vulnerable to credential stuffing and account takeover attacks, Financial institutions, businesses, and individuals whose data was sold on LeakBase
NEWS Info

Microsoft’s next Xbox, Helix, will further fuse the PC and console

Gaming Console Firmware/Bootloader

Microsoft's next-generation Xbox, codenamed 'Project Helix,' aims to blur the lines between PC and console by allowing it to play both Xbox and PC games, potentially running a Windows-based Full Screen Experience.

Key Points:
  • Project Helix will aim for performance parity with PC gaming.
  • It may run a version of Windows or the Xbox Full Screen Experience.
  • The console's hardware will likely utilize AMD silicon, similar to existing Xbox and PC configurations.
Affected: Xbox (Project Helix), Windows, AMD Hardware (SOCs)
VULNERABILITY Critical

CVE-2026-28470: OpenClaw

Linux Kernel/Embedded Linux

OpenClaw, a Linux kernel module often used in embedded environments for container management, contains an allowlist bypass vulnerability allowing command execution via command substitution injection.

Key Points:
  • The vulnerability allows attackers to bypass the allowlist protection in OpenClaw.
  • Command substitution syntax ($() or backticks) can be injected into double-quoted strings to execute arbitrary commands.
  • OpenClaw is frequently deployed in embedded Linux systems, particularly those utilizing containerization.
Affected: Embedded Linux systems using OpenClaw, Containerized environments running vulnerable OpenClaw versions
VULNERABILITY High

CVE-2026-28468: OpenClaw

Smart Home Device/Embedded Browser

OpenClaw's sandbox browser bridge server lacks authentication, allowing local attackers to control the browser and potentially exfiltrate sensitive data.

Key Points:
  • The vulnerability lies in the sandbox browser bridge server.
  • Lack of authentication allows local attackers to access control endpoints.
  • Attackers can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies/session data.
Affected: OpenClaw-enabled devices, Embedded systems utilizing OpenClaw as a browser component
VULNERABILITY High

CVE-2026-28466: OpenClaw

CI/CD Infrastructure (potentially impacting embedded development)

OpenClaw's gateway vulnerability allows authenticated clients to bypass approval gating and execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI/CD runners used for embedded system development.

Key Points:
  • Vulnerability in the gateway component of OpenClaw.
  • Failure to sanitize approval fields allows bypassing exec approval gating.
  • Attackers with valid credentials can execute arbitrary commands on connected hosts.
Affected: Developer Workstations, CI/CD Runners
VULNERABILITY High

CVE-2026-28463: OpenClaw

Linux Kernel/Gateway Software (potentially embedded)

OpenClaw's allowlist validation for shell execution is flawed, allowing attackers to read arbitrary files via shell expansion even after initial checks.

Key Points:
  • The vulnerability lies in the shell execution validation within OpenClaw.
  • Safe binaries like `head`, `tail`, or `grep` can be exploited to read files.
  • Glob patterns and environment variables are vectors for file disclosure.
Affected: OpenClaw installations, Systems utilizing OpenClaw as a gateway or node process (potentially embedded devices with custom gateways)
VULNERABILITY High

CVE-2026-28456: OpenClaw Gateway

IoT Devices/Edge Computing

OpenClaw's gateway component allows arbitrary code execution due to insufficient validation of hook module paths, enabling attackers with configuration modification access to load and execute malicious modules.

Key Points:
  • Vulnerability exists in the Gateway component of OpenClaw.
  • The vulnerability allows for arbitrary code execution via dynamic import().
  • Attackers need configuration modification access to exploit the vulnerability.
Affected: OpenClaw Gateway (versions 2026.1.5 prior to 2026.2.14)
VULNERABILITY Critical

CVE-2026-28454: OpenClaw

Telegram Bot Integration (Embedded Devices)

OpenClaw's Telegram webhook implementation lacks proper secret validation, enabling attackers to forge Telegram updates and potentially execute privileged bot commands on devices utilizing this integration.

Key Points:
  • Webhook secret validation is missing, allowing unauthenticated requests.
  • Attackers can forge Telegram updates by manipulating message identifiers.
  • Bypasses sender allowlists, potentially leading to unauthorized command execution.
Affected: OpenClaw installations, Devices utilizing OpenClaw with Telegram integration (e.g., Home Assistant, custom IoT devices)
VULNERABILITY High

CVE-2026-28453: OpenClaw

General Embedded Systems/File System Vulnerability

OpenClaw's TAR archive extraction process lacks proper path validation, allowing attackers to write files outside the intended directory via crafted archives.

Key Points:
  • Path traversal vulnerability in TAR archive extraction
  • Allows writing files outside the intended directory.
  • Potential for configuration tampering and code execution
Affected: Systems using OpenClaw versions prior to 2026.2.14, Embedded devices utilizing OpenClaw for file system operations (e.g., backup/restore)
VULNERABILITY Critical

CVE-2026-28446: OpenClaw

Telephony/VoIP Embedded Devices

OpenClaw versions prior to 2026.2.1 contain an authentication bypass vulnerability that allows attackers to bypass inbound access controls by exploiting flawed caller ID validation.

Key Points:
  • Authentication bypass vulnerability allows unauthorized access to voice-call agent.
  • Vulnerability exists due to flawed inbound allowlist policy validation, accepting empty caller IDs and using suffix matching.
  • Attackers can exploit this by placing calls with missing or partially matching caller IDs to execute tools.
Affected: OpenClaw PBX systems, VoIP Gateways utilizing OpenClaw, Industrial Control Systems with integrated VoIP functionality
VULNERABILITY Critical

CVE-2026-28391: OpenClaw

Embedded Linux/General Purpose with Embedded Applications

OpenClaw, a command approval system, fails to properly validate Windows cmd.exe metacharacters, allowing attackers to bypass restrictions and execute arbitrary commands.

Key Points:
  • OpenClaw is used in environments where command execution needs to be restricted, which can include embedded Linux systems running specialized applications.
  • The vulnerability allows for command injection via shell metacharacters, a common low-level security issue.
  • While the CVE specifically mentions Windows cmd.exe, similar vulnerabilities can exist in other command execution environments used within embedded systems.
Affected: OpenClaw installations, Embedded Linux systems utilizing OpenClaw for command approval
VULNERABILITY High

CVE-2026-28790: OliveTin

Smart Home Device

A vulnerability in OliveTin allows unauthenticated guests to terminate running actions via the KillAction RPC, despite authentication requirements for dashboard access, resulting in a denial-of-service.

Key Points:
  • Broken access control allows unauthorized termination of actions.
  • Vulnerability exists prior to version 3000.11.0.
  • Guests are blocked from dashboard access, but can still execute KillAction RPC.
Affected: OliveTin devices
VULNERABILITY High

CVE-2025-13350: Ubuntu Linux Kernel

Linux Kernel

A use-after-free vulnerability in Ubuntu's AF_UNIX garbage collector allows for local privilege escalation.

Key Points:
  • The vulnerability resides in the AF_UNIX garbage collector within the Linux kernel.
  • It's a use-after-free (UAF) vulnerability, leading to local privilege escalation (LPE).
  • Affected versions include Ubuntu Linux 6.8.0-56.58 before 6.8.0-84.84.
Affected: Ubuntu Linux 6.8
NEWS Critical

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

Network Equipment

Cisco has released patches for 48 vulnerabilities in its firewalls, including two critical flaws that could lead to remote code execution.

Key Points:
  • 48 vulnerabilities identified in Cisco firewalls
  • Two critical vulnerabilities with CVSS scores of 10
  • Vulnerabilities could allow for remote code execution
Affected: Cisco Firewalls
VULNERABILITY Critical

CVE-2026-27944: Nginx UI

Web Server/Reverse Proxy (used in embedded systems)

A critical vulnerability in Nginx UI allows unauthenticated attackers to download and decrypt full system backups, potentially exposing sensitive data like credentials and SSL keys.

Key Points:
  • The /api/backup endpoint lacks authentication, enabling unauthorized access.
  • The X-Backup-Security header reveals encryption keys needed to decrypt backups.
  • Backups contain sensitive data including user credentials, session tokens, and SSL private keys.
Affected: Embedded systems utilizing Nginx as a web server or reverse proxy, IoT devices with custom web interfaces built on Nginx UI, Industrial control systems using Nginx for remote access/management
VULNERABILITY High

CVE-2026-26999: Traefik

Linux Kernel/Reverse Proxy (embedded deployment)

A vulnerability in Traefik, a widely-used reverse proxy and load balancer, allows attackers to exhaust system resources by sending incomplete TLS records, potentially impacting embedded systems utilizing Traefik for ingress.

Key Points:
  • Vulnerability affects TLS handshake processing in TCP routers.
  • Attackers can cause denial-of-service by exhausting file descriptors and goroutines.
  • Impacts versions prior to 2.11.38 and 3.6.9.
Affected: Embedded Linux devices, IoT gateways, Edge computing platforms
VULNERABILITY Medium

CVE-2025-7375: Omada EAP610

Network Equipment

A crafted HTTP request can crash the Omada EAP610's HTTP service, leading to a denial-of-service until reboot.

Key Points:
  • DoS vulnerability in Omada EAP610
  • Adjacent network access required for exploitation.
  • HTTP service crash leading to unavailability.
Affected: Omada EAP610 Access Point, TP-Link Omada SDN Solution
NEWS Info

Ring Battery Doorbell + Indoor Cam bundle deal: 50% off

Smart Home Device

PCWorld reports a significant discount on a Ring Battery Doorbell and Indoor Cam bundle, highlighting their features for home security.

Key Points:
  • The Ring devices integrate with Alexa, indicating a reliance on cloud services and potentially embedded software.
  • The doorbell provides head-to-toe video coverage, suggesting firmware and hardware optimizations for image processing.
  • The indoor camera allows remote monitoring, implying embedded software for video streaming and user interaction.
Affected: Ring Battery Doorbell (firmware/hardware), Ring Indoor Cam (firmware/hardware), Alexa devices (integration)
NEWS High

Chrome 145 update fixes several critical browser vulnerabilities

Linux Kernel / Browser on Embedded Systems

A Chrome update addresses several critical vulnerabilities, including graphics library flaws (CVE-2026-3536, CVE-2026-3538, CVE-2026-3537), which could potentially impact embedded systems utilizing Chromium or Chrome.

Key Points:
  • Chrome 145 update fixes 10 security vulnerabilities.
  • Three critical vulnerabilities found in graphics libraries (Angle, Skia, PowerVR).
  • Several high-risk vulnerabilities relate to CSS and the V8 JavaScript engine.
Affected: Embedded Linux devices running Chromium/Chrome, Automotive Infotainment Systems (potentially), Industrial Control Systems with embedded browsers, IoT devices utilizing Chrome/Chromium
VULNERABILITY High

CVE-2026-30785: RustDesk Client

Smart Home Device/Remote Access Software

A prototype pollution vulnerability in RustDesk Client allows attackers to retrieve embedded sensitive data, potentially impacting devices utilizing the software for remote access.

Key Points:
  • Prototype pollution vulnerability allows modification of object prototype attributes.
  • The vulnerability affects password security, config encryption and machine UID modules within the RustDesk Client.
  • Affected routines include symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), and get_machine_id().
Affected: Windows, MacOS, Linux
NEWS Critical

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Cryptography & Embedded Systems

The article highlights the 'harvest now, decrypt later' threat posed by quantum computing, which necessitates proactive adoption of post-quantum cryptography across all systems, including embedded devices.

Key Points:
  • Attackers are collecting encrypted data now to decrypt it later with quantum computers.
  • Current encryption methods will be vulnerable to quantum attacks.
  • Organizations need to prepare for a post-quantum cryptography future.
Affected: IoT devices, Industrial Control Systems (ICS), Automotive ECUs, Medical Devices, Communication Equipment (routers, modems), Any device utilizing encryption
NEWS High

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Network Equipment

Cisco has confirmed active exploitation of two vulnerabilities in its Catalyst SD-WAN Manager software, including an arbitrary file overwrite vulnerability.

Key Points:
  • Two vulnerabilities (CVE-2026-20122) are being actively exploited.
  • CVE-2026-20122 is an arbitrary file overwrite vulnerability.
  • The affected product, Catalyst SD-WAN Manager, often resides in network infrastructure that interacts with embedded devices and industrial control systems.
Affected: Cisco Catalyst SD-WAN Manager devices, Networks utilizing Cisco SD-WAN infrastructure
VULNERABILITY Medium

CVE-2026-30791: RustDesk Client

Smart Home Device/Remote Access Software

The RustDesk client, a remote desktop software available on multiple platforms including mobile and web, is vulnerable to information disclosure due to insecure handling of configuration files, potentially allowing attackers to retrieve embedded sensitive data.

Key Points:
  • Vulnerability allows retrieval of embedded sensitive data.
  • Affects multiple platforms: Windows, MacOS, Linux, iOS, Android, WebClient.
  • Configuration import and URI scheme handling are implicated in the vulnerability.
Affected: Windows, MacOS, Linux, iOS, Android, WebClient
NEWS Low

Premium Robot Vacs Are Getting Cheaper. Ecovacs' New Model Proves It

Smart Home Device

Ecovacs is releasing a more affordable robot vacuum with features previously found in higher-end models, potentially impacting the security landscape of smart home devices.

Key Points:
  • The new model incorporates features from Ecovacs' premium line, suggesting more complex embedded software and hardware.
  • Lowering the price point means wider adoption of these devices, increasing the potential attack surface.
  • Robot vacuums rely on embedded systems for navigation, mapping, and communication (Wi-Fi), all of which are potential attack vectors.
Affected: Ecovacs Deebot X2 Omni, Similar robot vacuum devices from other manufacturers (iRobot, Shark, etc.)
NEWS Critical

ContextCrush Flaw Exposes AI Development Tools to Attacks

AI Development Tools (Potential Embedded Applications)

A critical vulnerability, dubbed 'ContextCrush,' in Context7's MCP Server could allow attackers to inject malicious instructions into AI development tools, potentially impacting embedded systems that leverage these tools for model training or deployment.

Key Points:
  • The ContextCrush vulnerability allows arbitrary code execution.
  • It affects the Context7 MCP Server, a tool used in AI development workflows.
  • AI models are increasingly being deployed on embedded devices (e.g., edge AI, autonomous vehicles, industrial automation), making this vulnerability potentially relevant to embedded systems security.
Affected: Context7 MCP Server installations, Embedded systems utilizing AI models developed with Context7 tools
NEWS Info

Watch Out, Meta. I Tried Alibaba's Qwen Smart Glasses and They're Mega Impressive

Consumer & Smart Devices

CNET reports on the launch of Alibaba's Qwen smart glasses, highlighting their AI capabilities and upcoming international rollout.

Key Points:
  • The glasses feature AI capabilities, including real-time translation and image recognition.
  • They are currently available in China and will be released internationally later this year.
  • The glasses utilize embedded systems to process AI tasks and display information.
Affected: Embedded System (Smart Glasses), Firmware
NEWS High

Hacked App Part of US/Israeli Propaganda Campaign Against Iran

Mobile App Security (with embedded implications)

A widely used Iranian prayer app was hacked and used to send deceptive messages, potentially impacting millions of users and raising concerns about the security of mobile applications with embedded functionality.

Key Points:
  • The BadeSaba Calendar app, with over 5 million downloads, was compromised.
  • Hackers used the app to send deceptive messages related to a conflict situation, potentially influencing public perception.
  • The incident highlights the vulnerability of mobile applications, particularly those with significant user bases and potential access to sensitive data or functionality.
Affected: Android Devices (Google Play Store), BadeSaba Calendar App
NEWS Critical

Zero-Click FreeScout Bug Enables Remote Code Execution

Smart Home Device/Email Server (embedded components)

A zero-click vulnerability in FreeScout, an email server often embedded within smart home devices and other systems, allows attackers to execute code remotely via Mail2Shell.

Key Points:
  • The vulnerability is a zero-click exploit, meaning no user interaction is required.
  • Mail2Shell allows attackers to leverage email clients as a proxy to execute commands on the target system.
  • FreeScout is often deployed in embedded environments, such as smart home devices and industrial control systems.
Affected: FreeScout servers, Devices utilizing FreeScout as an email component
NEWS Critical

Cisco Issues Patches for 48 Vulnerabilities in Enterprise Networking Products

Network Equipment

Cisco has released patches for 48 vulnerabilities, including two maximum-severity flaws in its Secure Firewall Management Center, which could allow remote code execution.

Key Points:
  • 48 vulnerabilities patched in Cisco enterprise networking products.
  • Two maximum-severity flaws affect Secure Firewall Management Center.
  • Vulnerabilities could lead to remote code execution.
Affected: Cisco Secure Firewall Management Center
VULNERABILITY Medium

CVE-2026-28551: Huawei HarmonyOS

Mobile OS/Embedded OS

CVE-2026-28551 describes a race condition vulnerability in Huawei's HarmonyOS device security management module, potentially impacting system availability.

Key Points:
  • Race condition vulnerability
  • Affects HarmonyOS 5.1.0 and 6.0.0
  • Impacts availability - denial of service possible.
Affected: Huawei Smartphones, Huawei IoT Devices (potentially), HarmonyOS-based devices
VULNERABILITY Medium

CVE-2026-28550: Huawei HarmonyOS

Mobile OS/Embedded Linux

CVE-2026-28550 describes a race condition vulnerability in Huawei's HarmonyOS security control module, potentially impacting system availability.

Key Points:
  • Race condition vulnerability in HarmonyOS security control module.
  • Successful exploitation may affect system availability (denial-of-service).
  • HarmonyOS is used in various Huawei devices, including smartphones and potentially other embedded systems.
Affected: Huawei Smartphones, Potential embedded devices running HarmonyOS
VULNERABILITY Medium

CVE-2026-28543: Huawei HarmonyOS

Mobile/Embedded OS

CVE-2026-28543 describes a race condition vulnerability in the maintenance and diagnostics module of Huawei HarmonyOS, potentially impacting system availability.

Key Points:
  • Race condition vulnerability affecting availability.
  • HarmonyOS is used in various Huawei devices, including smartphones and IoT devices, making it relevant to embedded systems.
  • The vulnerability resides in the maintenance and diagnostics module, a low-level component likely interacting with hardware.
Affected: Huawei Smartphones, Huawei IoT Devices (potentially), HarmonyOS-based embedded devices
VULNERABILITY High

CVE-2026-25702: SUSE Linux Enterprise Server 12 SP5

Linux Kernel

A kernel vulnerability in SUSE Linux Enterprise Server 12 SP5 allows improper access control, rendering nftables firewall rules ineffective.

Key Points:
  • The vulnerability affects the kernel, a low-level component of the operating system.
  • nftables is a core firewalling mechanism, impacting network security.
  • The vulnerability can be exploited to bypass firewall rules, potentially leading to unauthorized access or data breaches.
Affected: SUSE Linux Enterprise Server 12 SP5
VULNERABILITY TRANSPORTATION High

CVE-2026-27338: Car Zone (AivahThemes)

Automotive Infotainment System

A deserialization vulnerability in AivahThemes Car Zone allows for object injection, potentially leading to remote code execution within the car's infotainment system.

Key Points:
  • Deserialization vulnerability allows object injection.
  • Affects versions of Car Zone up to 3.7.
  • Car Zone is an automotive infotainment system, indicating embedded systems relevance.
Affected: Automobiles with AivahThemes Car Zone infotainment system, Vehicles utilizing vulnerable versions of the software
VULNERABILITY Medium

CVE-2026-29127: IDC SFX2100 Satellite Receiver

Satellite Receiver/Embedded Media Device

The IDC SFX2100 satellite receiver exhibits a file system permission vulnerability, granting overly permissive access to the monitor user's home directory, potentially enabling local privilege escalation.

Key Points:
  • The SFX2100 sets file system permissions to 0777 on the monitor user's home directory.
  • This grants read, write, and execute access to all local users.
  • The vulnerability could lead to local privilege escalation if highly privileged processes/binaries reside in the directory.
Affected: IDC SFX2100 Satellite Receiver, Embedded Linux (likely, given the file system permissions)
VULNERABILITY Critical

CVE-2026-3381: zlib (via Compress::Raw::Zlib)

Linux Kernel/Embedded Libraries

A critical vulnerability in zlib, a widely used compression library, affects versions included within the Perl module Compress::Raw::Zlib, potentially impacting embedded systems that utilize this library.

Key Points:
  • CVE-2026-3381 addresses findings from the 7ASecurity audit of zlib.
  • The vulnerability is fixed in zlib 1.3.2, included in Compress::Raw::Zlib version 2.220.
  • zlib is a core component in many embedded systems for data compression and decompression, making this vulnerability potentially widespread.
Affected: Embedded Linux devices using Compress::Raw::Zlib, Any system utilizing older versions of zlib through the Perl module Compress::Raw::Zlib, IoT devices, industrial control systems, and other embedded platforms that rely on zlib for compression.
VULNERABILITY Critical

CVE-2026-3257: UnQLite for Perl

Embedded Database

Versions of UnQLite for Perl using an older version of the underlying UnQLite library are vulnerable to a heap-based buffer overflow.

Key Points:
  • UnQLite is an embedded database library often used in resource-constrained environments.
  • The vulnerability stems from a heap-based buffer overflow within the UnQLite library itself.
  • Perl module versions 0.06 and earlier are affected due to reliance on an outdated UnQLite library version (2014).
Affected: Systems using UnQLite for Perl versions 0.06 and earlier, Embedded systems utilizing this module (e.g., IoT devices, industrial control systems)
VULNERABILITY High

CVE-2026-29123: IDC SFX2100

Linux Kernel/Embedded Linux

A SUID root-owned binary on the IDC SFX2100 running Linux allows for local privilege escalation via PATH hijacking, symlink abuse, or shared object hijacking.

Key Points:
  • SUID root-owned binary: This is a critical factor, as SUID binaries are often used in embedded systems for specific tasks requiring elevated privileges.
  • Local privilege escalation: This vulnerability allows an attacker to gain root access on the system, a significant security risk.
  • PATH hijacking, symlink abuse, shared object hijacking: These are common exploitation techniques that can be applied in embedded environments.
Affected: IDC SFX2100, Embedded Linux systems utilizing SUID binaries
NEWS Medium

Good Offense Leads to Effective Defense During Operation Epic Fury

Military/Defense Systems

Operation Epic Fury, a U.S. Army cyber exercise, demonstrated the effectiveness of offensive cybersecurity operations in identifying and mitigating vulnerabilities within military networks and systems.

Key Points:
  • The exercise focused on actively probing networks to discover weaknesses before adversaries could exploit them.
  • It highlighted the importance of proactive cybersecurity measures, including red teaming and penetration testing.
  • The article implies that many military systems rely on embedded devices, firmware, and low-level software which were targets of the offensive operations.
Affected: Military communication systems, Command and control systems, Embedded devices within military equipment
NEWS Info

Guyana Military Signals Modernization

Communication & Network Equipment / SATCOM Terminal

The article discusses Guyana's military modernization efforts, specifically focusing on upgrading communication infrastructure which likely includes satellite communications and related equipment.

Key Points:
  • Guyana is investing in modernizing its military communication systems.
  • The modernization includes improved satellite communications capabilities.
  • This upgrade will involve new equipment and potentially updated network infrastructure.
Affected: Military SATCOM terminals, Network infrastructure (routers, switches), Embedded communication devices
NEWS Medium

Authentication Downgrade Attacks: Deep Dive into MFA Bypass

Consumer & Smart Devices / Linux Kernel

The article details how improper implementation of FIDO2/WebAuthn MFA can lead to authentication downgrade attacks, bypassing phishing-resistant security measures.

Key Points:
  • Improper implementation of FIDO2/WebAuthn can allow attackers to downgrade authentication to less secure methods.
  • The attacks exploit vulnerabilities in how browsers and web servers handle FIDO2/WebAuthn challenges.
  • Attackers can potentially bypass phishing-resistant MFA by manipulating the authentication flow.
Affected: Web browsers (Chrome, Firefox, Edge), Web servers, Devices utilizing FIDO2/WebAuthn (e.g., smartwatches, security keys, embedded devices with WebAuthn support)
NEWS Info

Code Review & Dynamic Fuzzing of Microsoft’s Signing Transparency

Cloud Infrastructure (affecting embedded devices)

IOActive's assessment of Microsoft’s Signing Transparency (ST) service, built on the Confidential Consortium Framework (CCF), reveals strong security but identifies minor informational findings.

Key Points:
  • The assessment focused on code review, dynamic analysis, and fuzz testing of ST.
  • ST is designed for use on Azure and leverages the Confidential Consortium Framework (CCF).
  • The evaluation confirmed strong implementation security, secure integration, and compliance with ST’s objectives.
Affected: Azure Confidential Consortium Framework (CCF), Systems utilizing Azure ST for code signing verification
NEWS Medium

Better Safe Than Sorry: Model Context Protocol

AI/ML Edge Devices & Embedded Linux

The article highlights a security vulnerability in the Model Context Protocol (MCP), an increasingly popular standard for integrating AI models, which could be exploited to compromise servers running on embedded devices.

Key Points:
  • MCP's simplicity and widespread adoption have led to insecure server implementations.
  • Lack of mandatory authentication in MCP is a significant vulnerability.
  • The protocol's use in AI/ML applications makes it relevant to edge computing and embedded systems.
Affected: Embedded Linux systems running MCP servers, Edge AI devices utilizing MCP, IoT gateways integrating AI models
VULNERABILITY High

CVE-2026-28497: TinyWeb

Web Server (Embedded)

A vulnerability in TinyWeb, a Delphi-based web server, allows attackers to bypass Content-Length restrictions via HTTP Request Smuggling, potentially leading to unauthorized access and cache poisoning.

Key Points:
  • Integer overflow vulnerability in string-to-integer conversion.
  • Allows HTTP Request Smuggling by bypassing Content-Length restrictions.
  • Impact is critical for servers using persistent connections (Keep-Alive).
Affected: Windows-based systems running TinyWeb versions prior to 2.03, Embedded devices utilizing TinyWeb as a web server (e.g., industrial control panels, custom IoT gateways)
NEWS Info

MWC 2026 Last Day Live Updates: A Robot Phone, Xiaomi's Leitzphone and Labubu-Like Bots

Smartphones/Mobile Devices

MWC 2026 saw the unveiling of several innovative mobile devices, including a 'Robot Phone' and Xiaomi’s Leitzphone, which likely involve significant embedded systems components.

Key Points:
  • The 'Robot Phone' suggests advanced robotics integration, potentially involving embedded controllers and sensors.
  • Xiaomi’s Leitzphone is likely to feature custom hardware and software, including embedded systems for camera processing and other functionalities.
  • MWC is a major event showcasing mobile technology, which inherently relies on embedded systems.
Affected: Android (likely), Embedded controllers/microprocessors within smartphones
VULNERABILITY High

CVE-2026-29613: OpenClaw

Smart Home Device/Messaging Platform

OpenClaw's BlueBubbles plugin allows unauthenticated message injection via reverse proxy bypass due to improper authentication of webhook requests.

Key Points:
  • Vulnerability exists in the BlueBubbles plugin (optional) within OpenClaw.
  • Authentication bypass occurs due to reliance on loopback remoteAddress without header validation when behind a reverse proxy.
  • Attackers can inject arbitrary BlueBubbles message and reaction events without authentication.
Affected: OpenClaw instances running BlueBubbles plugin, Reverse proxy servers interacting with OpenClaw
VULNERABILITY Medium

CVE-2026-28486: OpenClaw

General Embedded Device

OpenClaw's archive extraction process is vulnerable to path traversal, allowing attackers to write arbitrary files during installation commands.

Key Points:
  • Path traversal vulnerability in archive extraction.
  • Vulnerable during installation commands (skills install, hooks install, plugins install, signal install).
  • Allows arbitrary file writes outside the intended directory.
Affected: OpenClaw installations on embedded devices (potentially), Any device utilizing OpenClaw's installation process.
VULNERABILITY High

CVE-2026-28485: OpenClaw

Smart Home Device

OpenClaw's browser-control API lacks authentication, enabling local attackers to execute arbitrary browser actions and access sensitive data.

Key Points:
  • The vulnerability lies in the /agent/act HTTP route.
  • Lack of mandatory authentication allows unauthorized local access.
  • Attackers can execute arbitrary browser-context actions and potentially steal in-session data.
Affected: OpenClaw installations on embedded devices, Local network users with access to the device
VULNERABILITY Medium

CVE-2026-28459: OpenClaw

Industrial PLC/SCADA Systems

OpenClaw, a component often used in industrial automation and SCADA systems, is vulnerable to arbitrary file writes due to insufficient validation of the sessionFile path.

Key Points:
  • The vulnerability allows authenticated gateway clients to write files outside the designated sessions directory.
  • This can lead to configuration corruption or denial of service.
  • OpenClaw is frequently deployed in industrial control systems (ICS) and SCADA environments.
Affected: Industrial Control Systems (ICS), SCADA systems, PLC environments utilizing OpenClaw
VULNERABILITY High

CVE-2026-28458: OpenClaw Browser Relay Extension

Browser-Based Embedded Systems/Automotive Infotainment

A vulnerability in the OpenClaw browser relay extension allows unauthenticated websites to access sensitive data and execute JavaScript within a browser, potentially impacting embedded systems utilizing Chromium-based browsers.

Key Points:
  • The vulnerability exists in the Browser Relay extension's CDP (Chrome DevTools Protocol) WebSocket endpoint.
  • No authentication is required to connect to the CDP endpoint via loopback (127.0.0.1).
  • Attackers can steal session cookies and execute JavaScript in other tabs.
Affected: Automotive Infotainment Systems (using Chromium-based browsers and OpenClaw), IoT Devices with embedded Chromium-based Browsers (using OpenClaw)
VULNERABILITY Medium

CVE-2026-28395: OpenClaw Chrome Extension Relay Server

Smart Home Device/Embedded Browser

A vulnerability in the OpenClaw Chrome extension relay server allows remote attackers to leak service presence and port information or conduct denial-of-service attacks due to improper network binding.

Key Points:
  • The vulnerability exists in the relay server component of the OpenClaw Chrome extension.
  • Wildcard hosts are treated as loopback addresses, leading to binding on all interfaces when a wildcard cdpUrl is configured.
  • Attackers can leak service presence and port information or perform denial-of-service attacks.
Affected: Smart Home Hubs, Custom IoT Devices using OpenClaw Chrome Extension
VULNERABILITY Medium

CVE-2026-28394: OpenClaw Gateway

Smart Home Device/Gateway

OpenClaw Gateways are vulnerable to a denial-of-service attack via oversized or deeply nested HTML responses, potentially crashing the Gateway process.

Key Points:
  • Denial of Service vulnerability
  • Memory exhaustion due to parsing oversized/nested HTML
  • Gateway process crash
Affected: OpenClaw Gateway devices
VULNERABILITY High

CVE-2026-28393: OpenClaw

Gateway/Edge Device

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability allowing arbitrary JavaScript execution with gateway process privileges, potentially impacting embedded gateways and edge devices.

Key Points:
  • Path traversal vulnerability in hook transform module loading.
  • Allows arbitrary JavaScript execution.
  • Requires configuration write access to exploit.
Affected: OpenClaw Gateways, Edge Devices utilizing OpenClaw
NEWS Medium

Nation-State Actor Embraces AI Malware Assembly Line

Linux Kernel/General Embedded Systems

APT36, a Pakistan-based threat group, is leveraging AI to automate malware creation at scale, potentially impacting embedded systems that rely on vulnerable Linux-based operating systems or exposed APIs.

Key Points:
  • APT36 is using AI (vibe-coding) to generate malware.
  • The scale of malware production is increasing, potentially overwhelming defenses.
  • While the generated malware may be 'mediocre,' the sheer volume poses a significant threat.
Affected: Linux-based embedded systems, IoT devices with vulnerable APIs
VULNERABILITY Medium

CVE-2025-70614: OC Messaging / USSD Gateway

Telecommunications Equipment/Gateway

OpenCode Systems' OC Messaging/USSD Gateway software contains a broken access control vulnerability allowing authenticated attackers to read SMS messages.

Key Points:
  • Broken access control vulnerability in the web-based control panel.
  • Allows authenticated low-privileged users to access arbitrary SMS messages.
  • Vulnerability lies in the company or tenant identifier parameter.
Affected: OpenCode Systems OC Messaging / USSD Gateway 6.32.2, Telecommunications gateways (potentially embedded within larger systems)
NEWS Info

AI is useless, zero trust is dangerous: Contrary lessons from Zero Trust World 2026

General Security Principles & Implications for Embedded Systems

Marcus Hutchins's presentation at Zero Trust World 2026 argues against over-reliance on AI and the current implementation of Zero Trust, suggesting a need for more fundamental security approaches.

Key Points:
  • Hutchins criticizes the hype around AI as a security solution, suggesting it's often ineffective and can create new vulnerabilities.
  • He cautions against the overly complex and potentially brittle nature of current Zero Trust implementations, arguing they can introduce new attack surfaces.
  • The presentation implies a need for a return to core security principles and more robust, low-level protections.
Affected: All embedded systems (indirectly)
NEWS Medium

OpenAI’s new flagship GPT model is made for AI agents

Linux Kernel / Operating Systems

OpenAI's GPT-5.4 can now control a PC by issuing commands to an AI agent, including clicking the mouse, editing files, and interacting with programs through screenshots.

Key Points:
  • GPT-5.4 can execute commands on a PC via the OpenAI API or Codex tool.
  • It can simulate mouse clicks, keyboard input, and interact with applications through screenshots.
  • This capability extends to web browsing and program interaction.
Affected: Linux-based embedded systems with API access (e.g., industrial control systems, smart home hubs), Devices utilizing OpenAI API or Codex tools, Embedded devices with web browsers and file system access
VULNERABILITY Medium

CVE-2026-28343: CKEditor 5

Smart Home Device/Consumer Electronics (potential)

A cross-site scripting (XSS) vulnerability in CKEditor 5 could allow unauthorized JavaScript code execution if the editor is integrated into an embedded system with unsafe General HTML Support configuration.

Key Points:
  • XSS vulnerability in CKEditor 5's General HTML Support feature.
  • Requires an unsafe configuration of the editor instance to be exploitable.
  • Patch available in version 47.6.0.
Affected: Embedded Linux-based devices utilizing CKEditor 5, IoT devices with web interfaces using CKEditor 5
NEWS Info

Apple Debuts the $599 iPhone 17E With MagSafe, and It Comes in Pink

Consumer Device (Smartphone)

Apple's new budget iPhone, the 17E, features increased base storage and MagSafe functionality.

Key Points:
  • The iPhone 17E is a new budget smartphone from Apple.
  • It includes MagSafe, indicating embedded wireless charging and accessory support.
  • Base storage has doubled compared to the previous model, likely involving firmware/software updates and potentially impacting low-level storage management.
Affected: iPhone 17E Firmware, iOS Operating System
NEWS Info

Everything Apple Announced This Week, From iPhone 17E to MacBook Neo

Consumer & Smart Devices (Apple Ecosystem)

Apple announced several new devices including iPhones, MacBooks, iPads and a Studio Display, all of which contain embedded systems.

Key Points:
  • New M5 chips are featured in MacBooks, impacting firmware and low-level drivers.
  • iPhone 17E includes updated hardware and software, potentially introducing new attack surfaces in embedded components.
  • iPad Air features a redesign with an upgraded chip, impacting the device's embedded OS and associated firmware.
Affected: iOS, macOS, iPadOS
NEWS Info

Roklue Trivia Game Helps You Stream New Roku Shows

Consumer & Smart Devices

Roku's new trivia game, Roklue, integrates with its streaming platform and may introduce new firmware or software components.

Key Points:
  • The game is integrated into the Roku streaming platform.
  • It utilizes questions based on awards shows to encourage content discovery.
  • New software/firmware components are likely involved in the game's functionality.
Affected: Roku Streaming Devices
NEWS Info

The Bose SoundLink Micro is down to $99 β€” its lowest price ever!

Smart Home Device

The article discusses a sale on the Bose SoundLink Micro Bluetooth speaker, highlighting its features like waterproofing and battery life.

Key Points:
  • The device is waterproof (IP67 rating), indicating embedded hardware and firmware support for this feature.
  • It includes a utility strap, suggesting some level of embedded software control or integration.
  • Playback time is mentioned (12 hours), implying power management firmware.
Affected: Bose SoundLink Micro firmware, Bluetooth stack (embedded)
NEWS Info

StarTech universal USB4 dock review: Perfect for 2 displays, tricky for 4

Linux Kernel/Device Drivers

A review of the StarTech Universal USB4 Docking Station highlights its capabilities for connecting multiple displays and legacy devices, but also notes limitations in charging and achieving consistent four-display output.

Key Points:
  • The dock utilizes USB4 and Thunderbolt 4, which are relevant to embedded systems due to their increasing adoption in various devices.
  • The review discusses driver and hardware compatibility issues when attempting to run four 4K displays simultaneously, highlighting potential firmware/driver dependencies.
  • The article mentions Display Stream Compression (DSC), a technique often used in embedded systems for efficient video transmission.
Affected: Thunderbolt 4/USB4 laptops, Embedded systems utilizing USB4/Thunderbolt 4 interfaces
VULNERABILITY Medium

CVE-2026-3598: RustDesk Server Pro

Remote Desktop Software (Potential Embedded Deployment)

RustDesk Server Pro, a remote desktop software, contains a vulnerability allowing retrieval of embedded sensitive data through its configuration export/generation routines.

Key Points:
  • Vulnerability allows retrieval of embedded sensitive data.
  • Affects Windows, MacOS, and Linux versions up to 1.7.5.
  • The vulnerability lies in configuration export/generation routines.
Affected: Windows, MacOS, Linux
NEWS Medium

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

Memory Management/Hardware Security

The article highlights a new botnet activity leveraging vulnerabilities in DDR5 memory modules, potentially impacting embedded systems that utilize this technology.

Key Points:
  • Researchers discovered a botnet exploiting vulnerabilities in DDR5 memory modules.
  • The botnet utilizes a novel technique to compromise systems, potentially impacting devices with DDR5 memory.
  • This highlights the growing importance of securing hardware components, including memory modules, in embedded systems.
Affected: Embedded Systems with DDR5, Industrial Control Systems (ICS) utilizing DDR5, Automotive ECUs with DDR5
NEWS Medium

Europol: Großer Markt für gestohlene Daten geschlossen

General Cybercrime impacting Embedded Systems

Europol coordinated an international operation to shut down Leakbase, a major online marketplace for stolen data.

Key Points:
  • Leakbase facilitated the trade of stolen data, potentially including credentials and sensitive information from various sources.
  • The platform had a large user base (142,000 registered users) and was accessible online.
  • The closure of Leakbase disrupts a key element in the cybercrime ecosystem, potentially impacting organizations that rely on embedded devices.
Affected: Potentially all systems connected to the internet, including those utilizing embedded devices.
NEWS High

Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns

Mobile Device Firmware

The Coruna exploit kit targets older iPhones running iOS versions 13.0 to 17.2.1, aiming to steal financial data through a multi-stage attack.

Key Points:
  • Coruna targets iOS versions 13.0 - 17.2.1, a significant range of devices.
  • The exploit kit utilizes multiple stages to compromise devices.
  • The primary goal is financial data theft, indicating a targeted attack.
Affected: iOS devices (iPhone)
NEWS Info

I Wore an Apple Watch and Oura Ring for Months. Here's the One I Actually Kept

Wearables/Fitness Trackers

The article compares the Apple Watch and Oura Ring, highlighting features and ultimately favoring one device, indirectly touching upon embedded system aspects.

Key Points:
  • Both devices rely on embedded systems for sensor data collection, processing, and communication.
  • The article mentions battery life which is a key consideration for embedded devices with limited power resources.
  • Data security and privacy are implicitly relevant as both devices collect personal health data, requiring secure firmware and communication protocols.
Affected: Apple Watch (firmware, Bluetooth), Oura Ring (embedded microcontroller, sensor firmware)
NEWS High

Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware

Government/Diplomatic Systems

A new malware campaign, Dust Specter, is targeting Iraqi government officials through impersonation and delivery of novel malware (SPLITDROP and GHOSTFORM), potentially impacting systems utilizing embedded devices.

Key Points:
  • Dust Specter is a new threat actor cluster linked to Iran.
  • The campaign uses impersonation of the Iraqi Ministry of Foreign Affairs.
  • New malware variants (SPLITDROP and GHOSTFORM) are being deployed.
Affected: Government networks in Iraq, Potentially embedded devices within government infrastructure (e.g., security cameras, access control systems, PLCs in critical facilities)
NEWS Medium

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Linux Kernel/Embedded Linux

The article highlights that multi-factor authentication (MFA) isn't a foolproof security measure, as attackers can still compromise networks with valid credentials, which is relevant to embedded systems using Linux-based operating systems.

Key Points:
  • MFA implementation doesn't guarantee complete security.
  • Attackers can still gain access using valid credentials obtained through other means (e.g., phishing, malware).
  • Coverage of MFA is crucial; incomplete implementation leaves vulnerabilities.
Affected: Embedded Linux devices, Industrial PLCs with web interfaces, IoT gateways, Network appliances
VULNERABILITY High

CVE-2026-21628: Unspecified Security Devices

Smart Home Device/Security Camera

An improperly secured file management feature allows unauthenticated users to upload dangerous data types, potentially leading to remote code execution.

Key Points:
  • Improperly secured file management
  • Unauthenticated access allows uploads
  • Potential for remote code execution (RCE)
Affected: Security Cameras, Smart Home Devices with file upload functionality, DVRs/NVRs
VULNERABILITY Medium

CVE-2025-11143: Jetty (embedded web server)

Web Server/Proxy on Embedded Devices

CVE-2025-11143 describes a URI parsing vulnerability in Jetty that could lead to security bypass or information disclosure due to differential parsing behavior across components.

Key Points:
  • Jetty is a widely used Java-based HTTP server and web application framework.
  • Many embedded devices utilize Jetty as a lightweight web server or proxy (e.g., IoT gateways, industrial control systems, smart home devices).
  • The vulnerability stems from inconsistent URI parsing logic.
Affected: Embedded Linux devices using Jetty, IoT gateways with Jetty web server, Industrial PLCs/HMIs utilizing Jetty for remote access
TRANSPORTATION TRANSPORTATION Info

How a Music Streaming CEO Built an Open-Source Global Threat Map in His Spare Time

SATCOM Terminal / Communication Equipment

A music streaming CEO created a global conflict tracking platform that leverages data from aircraft signals and satellite detections, potentially relying on embedded systems for signal processing and analysis.

Key Points:
  • The platform utilizes aircraft signals, which are received and processed by embedded systems in aviation equipment.
  • It incorporates satellite detections, requiring interaction with SATCOM terminals and related embedded hardware for data acquisition.
  • The system aggregates and analyzes global data, implying low-level processing of received signals to extract relevant information.
Affected: Aviation embedded systems, SATCOM terminals, Ground station receivers
VULNERABILITY High

CVE-2026-28117: smartSEO

Smart Home Device

A Remote File Inclusion (RFI) vulnerability in the smartSEO plugin for WordPress allows attackers to execute arbitrary code on systems running vulnerable versions.

Key Points:
  • The vulnerability is a Remote File Inclusion (RFI).
  • It affects versions of smartSEO up to 2.9.
  • The plugin is often used in conjunction with WordPress, which itself can be embedded within various IoT devices (e.g., digital signage, kiosks, smart home hubs) that require content management capabilities.
Affected: WordPress installations using the smartSEO plugin, IoT devices utilizing WordPress and the vulnerable smartSEO plugin
VULNERABILITY High

CVE-2026-28076: Frenify Guff

Smart Home Device

A missing authorization check in Frenify's Guff software allows exploitation of incorrectly configured access control security levels.

Key Points:
  • Missing authorization check allows unauthorized access.
  • Affects versions up to 1.0.1.
  • The vulnerability is classified as HIGH severity (CVSS 7.5).
Affected: Frenify Guff software
VULNERABILITY Medium

CVE-2026-28071: PixFort Core

Firewall/Security Appliance (Potential Embedded Component)

PixFort Core versions up to 3.2.22 are vulnerable to a missing authorization check, allowing exploitation of incorrectly configured access control security levels.

Key Points:
  • Missing authorization check allows bypassing access controls.
  • Affects PixFort Core versions up to 3.2.22.
  • The vulnerability involves access control, a critical security aspect.
Affected: PixFort Core Firewall/Security Appliance
VULNERABILITY Medium

CVE-2026-27406: My Tickets

Smart Home Device

CVE-2026-27406 describes a vulnerability in My Tickets where sensitive information can be embedded into sent data, potentially allowing retrieval of this data.

Key Points:
  • Sensitive information can be inserted into sent data.
  • The vulnerability allows retrieval of embedded sensitive data.
  • Affects versions from n/a through <= 2.1.0.
Affected: My Tickets application
VULNERABILITY Medium

CVE-2026-27396: Directory Pro

Smart Home Device

Directory Pro, a plugin often used in conjunction with directory listing software (often found on NAS devices or embedded web servers), has a missing authorization vulnerability allowing exploitation of incorrectly configured access control security levels.

Key Points:
  • The vulnerability is a missing authorization check.
  • It allows exploitation of incorrectly configured access control levels.
  • Directory Pro is frequently used in conjunction with directory listing software, which are often found on NAS devices and other embedded systems.
Affected: NAS Devices, Embedded Web Servers
VULNERABILITY Medium

CVE-2026-27370: Premio Chaty

Smart Home Device

CVE-2026-27370 describes a vulnerability in Premio Chaty chaty where sensitive information can be retrieved from embedded data within sent messages.

Key Points:
  • The vulnerability allows retrieval of embedded sensitive data.
  • Chaty is a chat application, likely deployed on a dedicated device or embedded system (e.g., smart home hub, IoT gateway).
  • Versions affected range from n/a up to and including 3.5.1.
Affected: Premio Chaty devices
VULNERABILITY Medium

CVE-2026-27344: inseri core

Industrial Control Systems

The inseri core software exhibits a missing authorization check, potentially allowing exploitation of incorrectly configured access control security levels.

Key Points:
  • Missing authorization check allows unauthorized access.
  • Affects versions up to 1.0.5.
  • The affected product, 'inseri core', is likely part of an industrial control system or similar embedded application based on the vulnerability description.
Affected: Industrial Control Systems (ICS), Embedded systems utilizing inseri core software
VULNERABILITY Medium

CVE-2026-23546: Classified Listing

Smart Home Device/Web Application (potentially embedded)

CVE-2026-23546 describes a vulnerability in the Classified Listing plugin where sensitive information can be embedded within transmitted data, potentially allowing retrieval.

Key Points:
  • Sensitive information insertion vulnerability
  • Affects Classified Listing plugin versions up to 5.3.4.
  • Data retrieval is possible due to the vulnerability.
Affected: Classified Listing Plugin Users
VULNERABILITY High

CVE-2026-26034: UPS Multi-UPS Management Console (MUMC)

Industrial Control Systems

The UPS MUMC software contains a DLL loading vulnerability that allows arbitrary code execution with SYSTEM privileges, potentially impacting industrial environments.

Key Points:
  • Incorrect default permissions allow arbitrary code execution.
  • The vulnerability is in the MUMC software, which manages UPS devices.
  • Exploitation allows attackers to gain SYSTEM privileges.
Affected: UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03)
VULNERABILITY High

CVE-2026-26033: UPS Multi-UPS Management Console (MUMC)

Industrial Control Systems

The UPS Multi-UPS Management Console (MUMC) software contains an unquoted search path vulnerability allowing arbitrary code execution with SYSTEM privileges.

Key Points:
  • Unquoted Search Path vulnerability (CWE-428)
  • Allows arbitrary code execution with SYSTEM privileges
  • Affects version 01.06.0001 (A03) of MUMC
Affected: Windows-based UPS Management Console
NEWS High

The Next Big Thing: Nuclear Power

Industrial & Critical Infrastructure

The article discusses the potential of advanced nuclear power technologies, including Small Modular Reactors (SMRs) and microreactors, highlighting their reliance on advanced control systems and digital technologies.

Key Points:
  • Modern nuclear power plants increasingly rely on digital control systems and embedded devices for operation.
  • SMRs and microreactors, with their smaller size and distributed nature, will likely incorporate more embedded systems.
  • Cybersecurity is a critical concern for these advanced nuclear facilities, given their connectivity and reliance on software-defined systems.
Affected: PLCs, SCADA Systems, HMI Panels, Nuclear Reactor Control Systems
NEWS Info

Semiconductor Industry Jargon

Semiconductor Manufacturing & Security

The article explains the complex jargon used within the semiconductor industry, highlighting its intersection with various engineering and scientific disciplines.

Key Points:
  • The semiconductor industry utilizes a vast and specialized vocabulary.
  • This jargon spans multiple disciplines including chemistry, physics, electrical engineering, and computer science.
  • Understanding this jargon is crucial for managing business impacts, cybersecurity consequences, and overall risk within the semiconductor supply chain.
Affected: Semiconductor Manufacturing Facilities, Chip Design Teams
NEWS Medium

Deepfake Defense: From No-Cost Basics to Enterprise-Grade Controls

Smart Home Device / Consumer Electronics

The article discusses the increasing threat of AI voice cloning for vishing and synthetic media attacks, potentially impacting devices with embedded voice assistants.

Key Points:
  • AI voice cloning is being used in red team exercises to bypass security controls.
  • Voice should be treated as untrusted input, requiring verification within controlled systems.
  • Deloitte estimates $40 billion in fraud losses by 2027 due to generative AI-accelerated vishing.
Affected: Smart speakers (Amazon Echo, Google Home), Voice assistants, Embedded voice recognition systems in various devices
NEWS Info

Daylight Saving Time Is Almost Here. Here's How to Get Ready

Consumer & Smart Devices

The article discusses Daylight Saving Time (DST) and how it affects clocks, which has implications for embedded systems that rely on accurate timekeeping.

Key Points:
  • DST changes require devices to update their internal clocks.
  • Many embedded systems (smart home devices, routers, etc.) automatically adjust for DST.
  • Incorrect time synchronization can lead to functionality issues or security vulnerabilities (e.g., expired certificates).
Affected: Smart Clocks, IoT devices, Routers, Embedded Linux systems