Security Research and Vulnerability Disclosure

RESEARCH & DISCLOSURES

Security research on critical infrastructure systems worldwide. SCADA. Maritime IoT. Railway control systems. Industrial networks. We follow responsible disclosure practices, working with vendors and government agencies to remediate vulnerabilities before public disclosure.

Critical Vulnerabilities in Maritime IoT Platform
Security Advisory

Critical Vulnerabilities in Maritime IoT Platform

Complete Attack Chain from Web Application to Vessel Control Systems

Security research on a maritime IoT platform revealed a complete attack chain enabling remote attackers to progress from web application vulnerabilities to full operational technology compromise of vessel control systems. Multiple CVSS 10.0 vulnerabilities affecting propulsion, steering, navigation, ballast, and electrical systems across commercial vessels.

January 2025CVSS 10.0
Critical Vulnerabilities in Indian Railways Control Systems
Security Advisory

Critical Vulnerabilities in Indian Railways Control Systems

REMMLOT, RMS, TMS, COA - Complete Railway OT Compromise

Critical vulnerabilities in Indian Railways systems enabling unauthorized access to locomotive controls, malicious code upload to train computers, and potential compromise of TCAS/Kavach collision avoidance. Multiple CVSS 10.0 findings.

January 2024CVSS 10.0
JWT Validation Bypass in Neo4j GraphQL Library
Security Advisory

JWT Validation Bypass in Neo4j GraphQL Library

RUDRA-SA-2023-001 - Authentication Bypass

A vulnerability in the Neo4j GraphQL Library's JWT authentication plugin allowed attackers to bypass tenant isolation when using third-party authentication providers such as Firebase. The library validated token signatures but failed to verify the `aud` (audience) and `iss` (issuer) claims, enabling cross-tenant authentication bypass.

2023CVSS 8.6
Critical Command Injection in Iplon iSolar Platform
Security Advisory

Critical Command Injection in Iplon iSolar Platform

RUDRA-SA-2026-002 - Unauthenticated RCE

A critical OS command injection vulnerability exists in the Iplon iSolar solar plant monitoring application. Unauthenticated remote attackers can execute arbitrary commands on the underlying server by injecting shell metacharacters into report generation parameters. During assessment of vulnerable deployments, exploitation provided direct access to underlying SCADA infrastructure and industrial control systems.

2024CVSS 10.0
Critical Server-Side Template Injection in Shuffle SOAR
Security Advisory

Critical Server-Side Template Injection in Shuffle SOAR

RUDRA-SA-2024-004 - Remote Code Execution Vulnerability

A critical Server-Side Template Injection (SSTI) vulnerability in Shuffle SOAR's Shuffle Tools application enables unauthenticated remote attackers to achieve arbitrary code execution. The vulnerability can be exploited through log poisoning or direct webhook access, allowing attackers to pivot into internal networks protected by the SOAR platform.

2024CVSS 8.5
FIMER Aurora Vision Information Disclosure
Security Advisory

FIMER Aurora Vision Information Disclosure

RUDRA-SA-2021-001 - CVE-2021-33209, CVE-2021-33210

Two information disclosure vulnerabilities in FIMER Aurora Vision Plant Portfolio Manager exposed operational data from over 3,000 solar power plant installations worldwide. The vulnerabilities allowed unauthenticated attackers to harvest GPS coordinates, firmware versions, serial numbers, and network configurations from critical energy infrastructure.

2021CVSS 5.3

Report a Security Vulnerability

If you've discovered a security vulnerability in critical infrastructure, we can help with responsible disclosure and remediation

Contact Security Team