Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Golioth — Vulnerabilities & Security Advisories 4

Browse all 4 CVE security advisories affecting Golioth. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Golioth is an IoT device management platform enabling remote monitoring and control of connected devices. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure authentication mechanisms. The platform has faced security incidents, including four publicly disclosed CVEs, highlighting risks in its web interface and device communication protocols. Security researchers have identified weaknesses in firmware update processes and default configurations that could allow unauthorized access. While Golioth provides device management capabilities, its historical vulnerability profile suggests organizations should implement additional security controls and regular patching to mitigate potential exploitation risks.

Top products by Golioth: Firmware SDK Pouch

This page lists every published CVE security advisory associated with Golioth. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.