Vulnerability Disclosure Policy
The following issues are not included:
- Bugs that do not involve security issues. This includes, but is not limited to, product functionality defects, garbled text on web pages, style inconsistencies, directory traversal of static files, application compatibility issues, and so forth.
- Vulnerabilities that cannot be exploited. This includes CSRF vulnerabilities without sensitive operations, meaningless disclosure of exception information and intranet IP addresses/domain names.
- Other issues that cannot directly reflect vulnerabilities, including but not limited to issues that are purely user speculation.
Low-risk security issues:
Vulnerabilities that can cause some impact but cannot directly obtain device permissions or compromise data security, such as non-critical information disclosure, URL redirection, relatively difficult-to-exploit XSS vulnerabilities, common CSRF vulnerabilities, and so on.
Medium-risk security issues:
- Vulnerabilities requiring interaction to obtain user identity information. This includes but is not limited to stored XSS vulnerabilities;
- Arbitrary text operation vulnerabilities, including but not limited to any file reading, writing, deletion, downloading and other operations;
- Unauthorized access, including but not limited to bypassing restrictions to modify user information and perform user operations;
- Relatively serious information leakage vulnerabilities. This includes sensitive information file leakage, such as DB connection passwords.
High-risk security issues:
- Vulnerabilities that can directly obtain business server permissions, including but not limited to arbitrary command execution, webshell upload, and arbitrary code execution;
- Vulnerabilities that directly lead to serious information leakage, including but not limited to SQL injection vulnerabilities in core database;
- Logical vulnerabilities that directly lead to serious impacts, including but not limited to any account password change vulnerability;
- Vulnerabilities that directly steal user identity information in batches, including but not limited to SQL injection;
- Unauthorized access, including but not limited to bypassing authentication to access the backend.
Serious safety issues:
- Directly obtain core system permissions. These vulnerabilities that can directly harm the intranet include but are not limited to command execution, remote overflow, etc.
- Vulnerabilities that can obtain a large amount of user core data;
- Logical vulnerabilities that can directly lead to serious impacts, including but not limited to vulnerabilities that contain serious logic errors, can obtain large amounts of benefits and cause losses to the company and users.
How to report a security issue:
If you find a vulnerability in a Beatbot Security product or have a security issue to report, please fill out the vulnerability report form.
When receiving a vulnerability report, we will take a series of steps to resolve the issue internally. All reported vulnerabilities are scored according to the Beatbot IOT Vulnerability Rating Criteria.
Reporters are required to provide confidential details about the vulnerability.
We will investigate and verify the reported vulnerability.
We will fix vulnerabilities and validate them across Beatbot security product lines.
We will release an OTA update to Beatbot Security products.
We will monitor the robustness of Beatbot security products after updates.
After receiving the report, we will acknowledge it within 3 business days and conduct an initial assessment. Evaluation will be completed within 7 business days, and we will either fix the vulnerability or devise a remediation plan.
When to fix:
Critical risk vulnerabilities will be fixed within 7 business days. High and medium risk vulnerabilities will be fixed within 30 business days. Low risk vulnerabilities will be fixed within 180 business days. Please note that some vulnerabilities may be subject to environmental or hardware limitations. Final timelines will be determined based on actual circumstances.
If you discovered a security or privacy vulnerability affecting Beatbot devices, software, services, or web servers, please report it to us. We welcome reports from anyone, including security researchers, developers, and customers. Beatbot will promptly and cautiously address security vulnerabilities in our products. We will take necessary measures to minimize customer risk, provide timely information, and deliver vulnerability fixes and mitigations required to address security threats in Beatbot devices, software, or web servers. We greatly appreciate anyone who gives us the opportunity to improve our products and services and better protect our users. Thank you for collaborating with us through the above process.
Email address: