Technical Advisory

Through sharp, technical and insightful analysis, the Payatu Team is constantly on the lookout for vulnerabilities and threats. This section exhibits a few of our findings.

Technical Advisory

Through sharp, technical and insightful analysis, the Payatu Team is constantly on the lookout for vulnerabilities and threats. This section exhibits a few of our findings.

Exposure of Stored Credentials via Open UART Logs and Firmware Dump

Vulnerability:

An information disclosure vulnerability exists in AZIOT 1 Node Smart Switch (16amp)- WiFi/Bluetooth Enabled Software Version: 1.1.9 due to improper access control on the UART debug interface. An attacker with physical access to the device can connect to the exposed UART interface and read sensitive information and dump or change the firmware from the serial console without authentication due to missing or improper access control.


Impact:


This vulnerability allows an attacker with physical access to the device to fully extract the
firmware and internal memory contents. As a result:

  • Firmware Intellectual Property Exposure: Proprietary firmware, algorithms and
    implementation details can be copied, reverse engineered or reused.
  • Credential and Key Disclosure: Sensitive data potentially stored in firmware or memory
    (such as Wi-Fi credentials, encryption keys, or API tokens) may be exposed.
  • Device Cloning and Counterfeiting: Extracted firmware can be flashed onto other
    hardware, enabling unauthorized device replication.
  • Firmware Modification and Malicious Reprogramming: Attackers could modify the
    firmware to introduce malicious functionality, persistent backdoors, or altered device
    behavior.

CVE ID:
CVE-2026-30613

Vendor:
AZIOT

Product:
Aziot 1Node Smart Switch

CVSS Score:
Base CVSS Score: 4.6
CVSS Base Vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Disclosure Timeline:
Reported to vendor – 14-Jan-2026
Reported to MITRE – 03-Feb-2026
CVE ID Reserved – 23-Mar-2026
CVE Published – 06-Apr-2026

Credits:
Mohammad Natiq Khan – Payatu Security Consulting Pvt. Ltd.

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by