IoT Product

IoTSF Vulnerability report: {dateTime}

Step 1: Tell us about the IoT Product

Manufacturers often have many different products or versions. The information you provide here will help the manufacturer identify the exact product and pinpoint the issue more quickly. Please provide as much information as possible.

* indicates a required field

Company or Manufacturer *
Please enter a value
We have some published disclosures that may be your Vulnerability, click to view.
Company or manufacturer:
Name of product:
Model, version or revision number:
Product platform:
Vulnerability type:
More information
View full disclosure.
New Company or Manufacturer

This Company or Manufacturer is new to the Vulnerable Things system. Please provide the following optional information to help us process your report.

If the relevant manufacturer or distributor is not already a member of the Vulnerable Things service, we will attempt to pass on your report using publicly available information, so that the manufacturer or distributor can engage with the coordinated vulnerability disclosure process. We cannot guarantee that our efforts will be successful, or that the relevant manufacturer or distributor will engage in the coordinated vulnerability disclosure.

Link to Company or Manufacturer's main website (optional)
Company email address (optional)

e.g. company or product support email address

Name of the product *
Please enter a value
Model, version or revision number *

e.g. of the hardware, software or cloud

Please enter a value
Category of IoT (optional)

Please choose a type for the IoT Product, or choose Other

e.g. lights, security cameras, refrigerator, kettle
e.g. blood and glucose monitors, fall detector
e.g. fitness tracker, smart watch
e.g. internet service provider Wi-Fi router
Category of IoT - Other *

Please provide a short description of the Category of IoT (max 50 words)

{data.product:type-other | words}/50 words
Please enter a value
Incorrect format (use letters & numbers)
Where is the vulnerability? *

Please choose a location, or choose Other

Vulnerability location - Other *

Please provide a description of the location

Please enter a value
Please make a choice
Can you provide a link to relevant open source code? (optional)

e.g. product or app source repository on GitHub, Bitbucket, etc.

This section is not yet complete

This section looks complete