Browse all 4 CVE security advisories affecting Fibar Group S.A. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Fibar Group S.A develops smart home security and IoT solutions, focusing on connected sensors and alarm systems. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and weak authentication mechanisms. The company has addressed multiple CVEs, including issues allowing unauthorized access and device takeover. While no major public security incidents have been documented, their vulnerability history reflects common IoT security challenges, emphasizing the need for robust firmware updates and secure coding practices in connected home environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-20990 | Fibaro Home Center Unauthenticated access to shutdown, reboot and reboot to recovery mode — Fibaro Home CenterCWE-306 | 7.5 | High | 2021-04-19 |
| CVE-2021-20991 | Fibaro Home Center Authenticated remote command execution — Fibaro Home CenterCWE-78 | 9.8 | Critical | 2021-04-19 |
| CVE-2021-20992 | Fibaro Home Center Unencrypted management interface — Fibaro Home CenterCWE-319 | 8.1 | High | 2021-04-19 |
| CVE-2021-20989 | Fibaro Home Center Insufficient remote access server authorization — Fibaro Home CenterCWE-295 | 5.9 | Medium | 2021-04-19 |
This page lists every published CVE security advisory associated with Fibar Group S.A. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.