Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

IObit — Vulnerabilities & Security Advisories 26

Browse all 26 CVE security advisories affecting IObit. AI-powered Chinese analysis, POCs, and references for each vulnerability.

IObit operates primarily as a developer of system optimization and security utilities, most notably through its Driver Booster and Advanced SystemCare suites. The company’s software ecosystem has been associated with twenty-six recorded Common Vulnerabilities and Exposures (CVEs), reflecting a history of security lapses in its desktop applications. These vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation or insecure default configurations within installer routines and background services. Notable incidents include the discovery of backdoors and excessive permissions in older versions of its security tools, which allowed unauthorized system access. While the firm positions itself as a provider of PC maintenance solutions, the recurring nature of these critical flaws highlights significant challenges in its secure development lifecycle, necessitating rigorous patch management for users relying on its optimization and protection features.

Found 1 results / 26Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-7832 IObit Advanced SystemCare Service ASC.exe symlink — Advanced SystemCareCWE-61 7.0 High2026-05-05

This page lists every published CVE security advisory associated with IObit. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.