BugProve uncovers seven pre-authentication remote code execution flaws and 26 post-authentication code execution vectors in Zavio IP cameras. Despite repeated warnings, Zavio remained unresponsive, necessitating intervention from CISA.
Improved public API, a new developer portal, larger file uploads and more.
Vulnerability monitoring, SBOM export, crisp new report pages and more.
If you want to learn more about all the upcoming IoT regulations in the US, including the Cyber Trust Mark, this is the article for you. We offer you guidance with a clear checklist included.
Learn the basics of binary analysis, including its use cases, limitations, the differences between static and dynamic approaches and more.
If you don't know where to get started about all the upcoming IoT regulations in Europe, this is the article for you. We offer you guidance with a clear checklist included.
Security tools should generate long PDF reports - so now we do.
We check from a pentester’s perspective why it is so tough to have secure IoT products on the market. Let’s see the 5 main reasons.
Delve into the specific firmware vulnerabilities that pose the greatest threat: authentication bypass, buffer overflows, and injection flaws. Gain insights into each vulnerability and their potential impacts.
Exploring the Impact of CVE-2023-31070: A Deep Dive into Broadcom BCM47xx SDK, found by Attila Szasz with BugProve's engine.
A short guide on how to use BugProve's proprietary PRIS engine to scan and evaluate firmware for unknown security vulnerabilities - so you can start your bug bounty journey now!
Announcing our first AI powered feature, helping you understand and fix issues faster.
A smaller one this time, focused on one much requested feature: shareable reports.
Check out our collection of books, podcasts, youtube channels, and other educational materials on IoT security and pentesting.
This is the first major update to our platform, and we are excited to give you a brief overview of the changes.
Discover the ins and outs of firmware security with this all-encompassing guide, including vulnerabilities, encryption, and best practices.
Learn about the limitations of firmware encryption and the risks of firmware hacking techniques that can bypass this security measure
The issue of low cybersecurity standards that plagued the IoT sector for years is going to be solved. Well, not at once, but we are making steps in the right direction.
We want to show you the full potential of our zero-day vulnerability discovery and firmware analysis features, so we made sure the results you get are completely available in our Free Plan as well.
An overview of the vulnerabilities found by BugProve in the SDK of Silicon Labs