IP
HD-Analogue
IP - 4G/5G
Thermal Imaging
LCD/TFT
C-WERK
Others
Housing & Bracket
Lens
PC Accessories
System Keyboard
Transmission
At Abetechs GmbH (Grundig Security), protecting our customers and the integrity of our products is a core priority. We welcome collaboration with the security research community and appreciate responsible vulnerability reporting. This policy explains how to report security issues and what you can expect from us during the process.
This policy applies to all vulnerabilities identified in Grundig Security products and solutions that are developed and maintained by us. It does NOT apply to third-party accessories, storage media, or other peripheral items offered on our website for compatibility or convenience, where security responsibility lies with the original manufacturer.
Participation in this process does not grant rights to intellectual property owned by Abetechs GmbH (Grundig Security) or third parties.
To help us investigate effectively, please provide as much detail as possible
We generally treat the following as security vulnerabilities: memory management errors, injection flaws, XSS, CSRF, privilege escalation, authentication/authorization weaknesses, misconfigurations with security impact, information disclosure, and supply chain issues directly affecting Grundig Security products.
We typically do NOT consider: configuration hardening recommendations without security impact, social engineering or physical attacks, denial-of-service from resource exhaustion without a specific flaw, issues in end-of-life products (Legacy products tab on Grundig-security.com), or vulnerabilities in third-party components not maintained by Grundig Security.
Our standard timeframe for coordinated disclosure is up to 90 days from acknowledgment. This may be adjusted in agreement with the reporter, depending on severity and complexity.
We work closely with security researchers to coordinate public disclosure in a way that ensures timely fixes and reduces risk for our users.
With the researcher’s consent, we will credit contributions in the related advisory and, where applicable, in the corresponding CVE Record.
Grundig Security does not operate a public bug bounty program and does not provide financial rewards. However, we value the efforts of the security research community and recognize researchers who report vulnerabilities responsibly.
If you follow this policy and act in good faith:
Good-faith research does NOT include activities such as accessing, altering, or exfiltrating data beyond what is necessary to demonstrate the vulnerability, or intentionally impacting the availability, confidentiality, or integrity of Grundig Security services or customer data.
ID
Date
Product
Description / Issue Summary
Affected Versions
Status / Fix
CWERK-2025-1
2024-07-10
C-Werk
Exposure of Licensing-Related Sensitive Information in Diagnostic Dumps
2.0.0 – 2.0.1
Fixed in v. 2.0.2
CWERK-2025-2
2024-10-12
Improper Session Cleanup on Role Removal in Web Admin Panel
before 2.0.3r
Fixed in v. 2.0.3
CWERK-2025-3
2025-01-19
Incorrect Evaluation of LDAP Nested Groups during Login
before 2.0.2
GU-IPC-1
2025-07-01
SmartLine IPS
A specific POST API request allows to change sensitive / embedded data like serial number and MAC address of the device. If certain values are changed, operation can no longer be guaranteed. Device can be bricked if non-ASSCI symbols are submitted.
V31.35.8.2.3.4 and timestamp 2310XX
FW V31.35.8.2.3.4 with timestamp 2401XX and above
GU-NVR-1
SmartLine NVR
A specific POST API request allows to change sensitive / embedded data like serial number and MAC addresses of the device. If certain values are changed, operation can no longer be guaranteed. Device can be bricked if non-ASSCI symbols are submitted.
FW V31.35.8.2.3.4 and timestamp 2310XX