Cyberauto Challenge 2025
Introduction As a graduate student, it was an honor to attend the CyberAuto Challenge from July 14th to July 18th, 2025, in Detroit, Michigan. This event has...
Introduction As a graduate student, it was an honor to attend the CyberAuto Challenge from July 14th to July 18th, 2025, in Detroit, Michigan. This event has...
WESECUU IoT Security Light Bulb System Security Review through Reverse Engineering
Summary SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function.
Summary SoftEther VPN 5.02.5187 is vulnerable to Buffer Overflow in Internat.c via the UniToStrForSingleChars function.
Summary SoftEtherVPN 5.02.5187 is vulnerble to denial of service via the UnixMemoryAlloc function.