Internet Of Things (IoT) vulnerability scope

Millions of embedded internet-enabled devices worldwide are providing an incredibly rich set of data and accessibility for firms and users.

Are you an IoT expert? We’re looking for you!


We are currently looking for the following items in IoT:

  • Code execution
  • Command execution
  • Authentication bypass
  • Cross-site scripting (XSS) vulnerability leading to RCE
  • Directory traversal vulnerability

Found something not on this list? We still want to buy it!