💻 Have you read our latest publication?
A vulnerability in TOTOLINK LR1200GB allows remote unauthenticated attackers to become authenticated due to a stack overflow vulnerability in the web interface:
🚨 New advisory was just published! 🚨
A vulnerability in the Linux kernel allows local attackers to escalate privileges on affected installations of Linux Kernel:
Our new episode of Lil’ Bytes, a collection of advanced talks from security experts is here!
In our latest episode, Jay Turla (
@shipcod3
), manager of Security Operations at Bugcrowd, shares his “Dirty CAN Bus Hacking: I CAN Fuzz my Car and Junks” talk.
Lil’ Bytes, our new collection of advanced talks from leading security experts is here!
To kick things off, Alexander Ermolov (
@flothrone
), firmware security researcher, shares his “Untrusted Roots: exploiting vulnerabilities in Intel ACMs” showcase.
Our new episode of Lil’ Bits: a collection of introductory security talks is now here!
In this episode, we discuss XSS vulnerabilities, the potential risks and demonstrate how a stored XSS attack can be exploited in a vulnerable website
The PHP vulnerabilities reported to us last year, were some of the most engaging research we published in 2020.
Read all about it in our new blog post:
New advisory is now out!
Find out how an independent Security Researcher, Charles Fol (
@cfreal_
) used a UAF vulnerability in PHP to allow attackers that are able to run PHP code to escape disable_functions restrictions.
Slack recently paid a researcher $1750 USD for an RCE.
The same disclosure through our program, would have earned him in excess of $10,000 USD!!
Submit your findings quickly and discreetly and get the BIG payouts you deserve!
Found a Pre-Auth remote code execution in Wordpress?
Submit your vulnerability today and let us handle the hassle for you.
Visit to see how much your research is really worth!
🚨 New advisory was just published! 🚨
A chaining of three vulnerabilities allows unauthenticated attackers to execute arbitrary command with root privileges on Zyxel VPN firewall:
💻Have you read our latest publication?
A vulnerability in the TP-Link NCXXX family of devices allows accessing the device without credentials and could lead to the complete compromise of the device:
Our new episode of Lil’ Bits: a collection of introductory security talks is here!
In this video, we discuss the most common types of security vulnerabilities, what they look like, and how to execute them.
Xmas may be over, but there's still a chance to win big with our New Year's Challenge!
Be the first to solve and email us the solution to contact
@ssd
-disclosure.com and win 300$ in Amazon gift cards. Good luck! 🎁
Found a vulnerability in Huawei USG?
We are offering up to $75K for Huawei USG vulnerabilities!
Submit your findings today at and see how much your research is really worth 💸💸💸
During TyphoonCon CTF 2021, the Chrome challenge presented was one of our hardest challenges ever!
As Chrome vulnerabilities and bypasses could use better exposure, we're happy to present you with a challenge focused on how Chrome and its internal mechanisms work.
Our Weekly News Update is here!
Join us as we discuss the RCE found by Project Zero in Libgcrypt, the supply chain attack on NoxPlayer and North Korea's security researcher targeting campaign:
🚨 New advisory was just published! 🚨
A vulnerability in the way Linux handles the CLOCK_THREAD_CPUTIME_ID allows local attackers to reach a race condition and use this to elevate their privileges to root:
Our Weekly News Update is here!
This week we discuss the recent updates in North Korea's security researcher targeting, The Great Suspender extension being removed from the Google Store and CSRF vulnerabilities found on WP NextGen Gallery.
We are super excited to have reached 10,000 followers and to celebrate, we're giving away 10 custom SSD hoodies that will get you through winter in style! 🥳
To enter just retweet and leave a comment on this post.
Netgear Nighthawk vulnerabilities are now in high demand!
Found a vulnerability in one of Netgear’s Nighthawk devices?
Submit your findings today at and see how much your research is really worth 💸💸💸
New advisory is now out!
Roundcube is a browser-based IMAP client with an application-like UI.
Find out how we exploited a XSS vulnerability via an email we sent to an unsuspecting victim and managed to use JavaScript to steal the user’s inbox.
ASUS router vulnerabilities are now in high demand!
Found a pre-auth RCE vulnerability in one of ASUS routers?
Submit your findings today at and get the BIG payouts you deserve 💰💰💰
The new episode of Lil’ Bytes, a collection of advanced talks from leading security experts is here!
In our new episode, Ali Abdollahi (
@AliAbdollahi2
), a leading Information security consultant, shares his “Malware Mathematical Modeling talk”
New advisory is now out!
The Nighthawk R7000 is a popular Netgear router, with over 50,000 positive reviews on Amazon.
Find out how a vulnerability in NETGEAR R7000 allows an attacker to run arbitrary code without requiring authentication.
Foscam Wireless IP Cameras are the forefront of consumer wireless IP video, offering powerful, affordable technology.
We are on the lookout for IP Cameras experts. Know how to hack Foscam Cameras?
Reach out today and see what your research is worth!
New advisory is now out!
IBM AIX is a series of Unix OS, used for large enterprise server platforms.
Find out how a vulnerability in AIX's snmpd service allows an unauth attacker to trigger a stack overflow and run arbitrary code with root privileges.
New advisory is now out!
Find out how a vulnerability in Infinite WP's password reset mechanism allows an unauthenticated user to become authenticated and then carry out a Remote Code Execution.
pfSense Firewall vulnerabilities are now in high demand!
Found a vulnerability in pfSense Firewall?
Submit your findings today at and see how much your research is really worth 💸💸💸
🚨 New advisory was just published! 🚨
A vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating system:
🚨 New advisory was just published! 🚨
The NVMS9000 product by TVT has a critical security flaw that allows remote unauthenticated attackers a wealth of information on the device:
New advisory is now out!
TerraMaster Operating System is an OS designed for TNAS devices.
Find out how we exploited a TerraMaster OS unauth vulnerability and gained root access.
New advisory is now out!
Find out how a chain of vulnerabilities in rConfig allows a remote unauthenticated user to gain ‘apache’ user access to the vulnerable rConfig installation.
New advisory is now out!
Find out how vulnerabilities in TG8 Firewall allows remote unauthenticated users to execute arbitrary code on the remote device as well as disclose the passwords of existing accounts:
Apache vulnerabilities are now in our scope!
Know how to run remote code execution in Apache HTTP Server?
Submit your vulnerability today at and see how much your research is really worth💸💸💸
New advisory is now out!
DD-WRT is a Linux OpenSource firmware, suitable for routers and embedded systems.
Find out how a vulnerability in DD-WRT allows an unauth attacker to overflow an internal buffer and trigger a code execution vulnerability.
GRUB is a core feature of many OS. Finding a vulnerability in it is critical for many servers and desktops, making it a highly sought after target for our customers.
Found a GRUB vulnerability and looking for the highest payout for it?
Learn more at:
DD-WRT is a Linux based IoT Operating system firmware and is considered a very challenging product to hack.
DD-WRT is now on our scope and we are looking for researchers to submit their findings and receive the credit and generous rewards they deserve!
We are all connected by something greater than InfoSec. Memes.
Comment on this post with your favorite cybersec / disclosure memes and we’ll select 2 winners by February 10th who’ll receive some awesome prizes.
New advisory is now out!
Ivanti Avalanche is a mobile device security management system.
Find out how a directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated users to access files that reside outside the ‘image’ folder
🚨 New advisory was just published! 🚨
A vulnerability in EdgeRouters's and AirCube's miniupnpd allows LAN attackers to cause the service to overflow an internal heap and potentially execute arbitrary code:
🚨 New advisory was just published! 🚨
A vulnerability in the way KerioConnect processes HTML attachments, allows an attacker to inject arbitrary JavaScript into an email and take full control over the victims’ mailbox:
New advisory is now out!
VoIPmonitor is an open source network packet sniffer with commercial frontend for Linux based SIP RTP and RTCP VoIP protocols.
Find out how a vulnerability in VoIPmonitor allows an unauth attacker to execute arbitrary code
🚨 New advisory was just published! 🚨
A buffer overflow in TP-Link ViGi onvif_discovery can be leveraged by a network-adjacent attacker to execute arbitrary code on the target as root:
🚨New advisory was just published!🚨
A vulnerability in Mozilla Firefox has been found to not show an executable file warning when downloading .atloc and .ftploc files, which can run commands on a user’s computer:
🚨 New advisory was just published! 🚨
IP.Board e-commerce plugin 'nexus' contains two security vulnerabilities that when combined can be used to trigger a pre-auth RCE:
🚨 New advisory was just published! 🚨
A vulnerability in TP-Link's TL-WR840N allows remote attackers to trigger a stack overflow vulnerability allowing remote attackers to cause a denial of service in httpd:
🚨 New advisory was just published! 🚨
A vulnerability in pfSense allows authenticated users to cause the product to execute arbitrary code - this in turn would allow an attacker to compromise the machine on which the pfSense is installed:
RFID locks are electronic radio frequency tags and readers, common in hotels where they are used as a contactless way to open door locks.
We are on the lookout for RFID experts. Know how to hack RFID locks? Reach out and see what your research is worth!
Found a vulnerability in one of TP-Link’s routers?
We are offering up to $35K for TP-Link router exploits.
Submit your findings today at and get the BIG payouts you deserve 💰
🚨 New advisory is now out! 🚨
A vulnerability in SharePoint Server allows authenticated attackers that are able to create a site on the server to cause it to execute arbitrary code:
CTFs are information security competitions, offering a challenge for both novice and expert researchers, usually alongside large cash rewards.
Read our latest article: “What is a CTF and is it for you?”, learn how to get started and beat the competition.
🚨 New advisory was just published! 🚨
A vulnerability in TOTOLINK LR1200GB allows remote unauthenticated attackers to become authenticated due to a stack overflow vulnerability in the web interface:
TerraMaster vulnerabilities are now in high demand!
Found a vulnerability in TerraMaster?
Submit your findings today at and see how much your research is really worth 💸💸💸
Our Weekly News Recap is here!
This week, we discuss five vulnerabilities found in Dell devices, a Rootkit infiltrating high profile firms, four plead guilty to aiding cybercriminals and our CVE of the week: RCE found in the universal Turing machine
cPanel expert? Passionate about Plesk vulnerabilities?
We’re on the lookout for Web Hosting Control Panel researchers.
Submit your findings and get the BIG rewards and credit you deserve!
Learn more at
🚨 New advisory was just published! 🚨
Security vulnerabilities in DIR-X4860 allow remote unauthenticated attackers that can access the HNAP port to gain elevated privileges and run commands as root:
A new challenge is now live!
This challenge is a binary running inside a Docker with certain vulnerabilities in it!
First one to solve it (send a script that retrieves the flag to contact
@ssd
-disclosure.com) will win a $100 Amazon gift card!
Good luck!
HP Printer vulnerabilities are now in our scope!
Found a pre-auth RCE vulnerability in one of HP’s printers?
Submit your findings today at and get the BIG payouts you deserve 💰💰💰
New advisory is now out!
Find out how the Chrome Ad-Heavy detection mechanism can be bypassed. Bypassing the mechanism would allow ads that are breaching the restrictions imposed by Chrome to still run:
Our security researcher community comes from all over the world. Get acquainted with some of the top security researchers out there, learn of their early careers, their motivation and what they believe the future holds.
Find out more in our blog:
New advisory is now out!
NetMotion Mobility is a secure platform for remote workers in mobile environments.
Find out how vulnerabilities in NetMotion Mobility allow an unauthenticated attacker to run arbitrary code on the server with SYSTEM privileges.
Found a vulnerability in Windows?
We are offering up to $70K for Windows PE & RCE!
Submit your findings today at and get the BIG payouts you deserve 💰💰💰
Know how to run commands on FortiGate Firewall?
We are offering up to $120,000 for FortiGate NGFW vulnerabilities!
Visit and see what your research is really worth🧐
New advisory is now out!
The Nighthawk X8 AC5000 router is a popular device sold by Netgear with 2000+
positive reviews on Amazon.
Find out how we exploited an unauthenticated Netgear Nighthawk R8300 vulnerability and gained root access to the device.