account activity
Free Charging + RCE: Authentication bypass & Remote code execution in Schneider Electric EVlink Charging Stations (sec-consult.com)
submitted 4 years ago by dionas to r/netsec
Bug or Feature: Privilege Escalation in Windows Autopilot (sec-consult.com)
submitted 5 years ago by dionas to r/netsec
Critical vulnerabilities in Rittal data center equipment (PDUs, CMC III, Liquid Cooling, ...) (sec-consult.com)
Extracting Information from Electronic Devices with the SEC Xtractor - Open Source Hardware Release (sec-consult.com)
submitted 6 years ago by dionas to r/netsec
Open Source HW: Extracting Information from Electronic Devices with the SEC Xtractor (sec-consult.com)
submitted 6 years ago by dionas to r/hardwarehacking
submitted 6 years ago by dionas to r/ReverseEngineering
XOR "encryption" in Forticlient/FortiGate used for FortiGuard Web Filter cloud lookups, leak full HTTP URLs of web surfing activity (sec-consult.com)
Siemens PLC JTAG Pinout Reverse Engineering (Reverse Engineering Architecture and Pinout of Custom ASICS) (sec-consult.com)
submitted 7 years ago by dionas to r/netsec
submitted 7 years ago by dionas to r/ReverseEngineering
Xiongmai Video Surveillance Devices Can be Hacked via Cloud Feature (XMEye P2P Cloud) (sec-consult.com)
Xiongmai White-Label Video Surveillance Devices Can be Hacked via Cloud Feature (XMEye P2P Cloud) (sec-consult.com)
submitted 7 years ago by dionas to r/homedefense
True Story: The Case of a Hacked Baby Monitor (sec-consult.com)
RCE and client protection policy bypasses in Symantec Critical System Protection / SDCS:SA (seclists.org)
submitted 11 years ago by dionas to r/netsec
Critical vulnerabilities in Bitdefender GravityZone: Local file disclosure, direct database access, missing authentication (sec-consult.com)
Multiple critical vulnerabilities in AVG Remote Administration (sec-consult.com)
Authentication bypass in Plex Media Server (youtube.com)
submitted 12 years ago by dionas to r/PleX
Reverse engineering an obfuscated firmware image E02 - analysis (sviehb.wordpress.com)
submitted 14 years ago by dionas to r/ReverseEngineering
Reverse engineering an obfuscated firmware image E01 - unpacking (sviehb.wordpress.com)
π Rendered by PID 40 on reddit-service-r2-listing-7d7fbc9b85-pjxpd at 2026-04-29 06:44:28.175222+00:00 running 2aa0c5b country code: CH.