Cancel
IoT Product
Vulnerability
Review
{alertErrors | watch serverErrors}
Ready to submit
3/3

Step 3: Review

The report is ready to submit. Please review your privacy options and summary, attach any supporting documents, and then click to submit.

You can click on the links above to amend any data.

Report Settings
Supporting documents

Upload any supporting documents as a single ZIP, PDF or Word Document (Max 10MB).

You can only upload ZIP, PDF or Word Documents
The uploaded document must be a maximum of 10MB in size
Your vulnerability report
The product
Company or manufacturer:
{data['product:manufacturer']}
Link to Company of Manufacturer's main website
{data.product:manufacturer-url}
Company email address
{data.product:manufacturer-email}
Name of product:
{data['product:name']}
Model, version or revision number:
{data['product:model']}
Category of IoT:
{data['product:type']} - {data['product:type-other']}
Location of vulnerability:
, {item} - {data['product:where-other']}
Web page:
{data.product:link | ternary data.product:link 'Not Supplied'}
The vulnerability
Discovery date:
{data['vulnerability:date']}
Technical description:
{data['vulnerability:description']}
Connected devices:
{data['vulnerability:devices']}
System configuration:
{data.vulnerability:configuration | ternary data.vulnerability:configuration 'Not Supplied'}
Were other parties involved?
{data['vulnerability:third-parties']} - {data['vulnerability:third-parties-other']}
Potential Threats:
, {item} - {data['vulnerability:threat-other']}
Risk level:
{data['vulnerability:risk']}
Is the exploit publicly available now?
{data['vulnerability:exploit']}
Link to the exploit
{data.vulnerability:exploitlink | ternary data.vulnerability:exploitlink 'Not Supplied'}
Do you believe it is being exploited now?
{data['vulnerability:exploited']}

Please help us to improve the Vulnerable Things service

This following information is collected so that we may better understand use of the Vulnerable Things service. Data will be anonymised and will not be shared or sold to third parties.

Are you working with a team of researchers? (optional)
Please select your geographical area (optional)
Please complete the captcha
By clicking Submit I confirm that I submit this IoT Vulnerability Report in accordance with the Terms and Conditions.
Top