IOIoT Support Risk

Check IoT support and vulnerability risk before deployment.

Connected devices can stay in use long after vulnerability or support signals change. Search CVE, exploited, and EPSS risk records first.

Track consumer IoT device vulnerabilities, support-life, known exploited CVEs, EPSS risk, and firmware signals.

Side-by-side comparison

Compare device records before reviewing report options.

Compare status, category, risk, and source confidence in one view. The paid report adds the locked citations and next-step checklist.

deviceSecurity signalStatusRiskConfidence
CVE-2015-2052Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface.NVD CVE recordCVEReview90
CVE-2015-2051The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.NVD CVE recordCVEReview90
CVE-2015-1437Multiple cross-site scripting (XSS) vulnerabilities in Asus RT-N10+ D1 router with firmware 2.1.1.1.70 allow remote attackers to inject arbitrary web script or HTML via the flag parameter to (1) result_of_get_changed_status.asp or (2) error_page.htm.NVD CVE recordCVEReview90
CVE-2015-0869I-O DATA DEVICE NP-BBRM routers allow remote attackers to cause a denial of service (SSDP reflection) via UPnP requests.NVD CVE recordCVEReview90
CVE-2014-7270Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376.3715 and earlier allows remote attackers to hijack the authentication of arbitrary users.NVD CVE recordCVEReview90
Why this database exists

Use IoT Support Risk without reading raw source rows.

consumers, MSPs, cyber insurers, retailers, property managers, schools, and device vendors need searchable source records, plain-English explanations, paid citations, and a clear escalation path when the public preview is not enough.

For security teams

Prioritize known exploited and high-confidence records.

For buyers

Check support and vulnerability signals before purchase.

For MSPs

Use reports and monitors for customer device review.

Coverage registry

Source names, source URLs, and citation paths are included in paid reports and workspace access. Security records are triage intelligence and should be validated against asset inventory, firmware versions, compensating controls, and vendor advisories.

Coverage groupRecords source countMax authorityAccess
state source reference505/5Included in paid report
source reference45/5Included in paid report
cisa kev15/5Included in paid report
epss14/5Included in paid report
nvd cve15/5Included in paid report

Facility Report Bundle

$29first report + $5 each additional

Device/security signal snapshot Includes locked citations, interpretation, risk questions, and action checklist.

Request access

Professional Workspace

$199per month

Session workspace for saved review context, report access, record review, correction/claim intake, and API access requests.

Request access

Portfolio Monitor

$899per month

Portfolio monitor setup for selected records, daily source refresh review, workspace review access, and escalation checklist.

Request access

Enterprise Onboarding

$2,500one time

Enterprise onboarding intake for custom coverage, users, API/report delivery, monitoring rules, and human QA workflow.

Request access

Request access, corrections, claims, or API review.

High-impact use cases should request human QA before relying on automated source records.

Prefer email? Contact info@dataverityhub.com.