<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/index.php?action=history&amp;feed=atom&amp;title=BlackVue_firmware_security_vulnerabilities</id>
	<title>BlackVue firmware security vulnerabilities - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/index.php?action=history&amp;feed=atom&amp;title=BlackVue_firmware_security_vulnerabilities"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=BlackVue_firmware_security_vulnerabilities&amp;action=history"/>
	<updated>2026-05-14T23:18:30Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=BlackVue_firmware_security_vulnerabilities&amp;diff=48242&amp;oldid=prev</id>
		<title>Louis: fixed server logs -&gt; referral urls per source, moved nvd ref to correct claim</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=BlackVue_firmware_security_vulnerabilities&amp;diff=48242&amp;oldid=prev"/>
		<updated>2026-03-29T04:20:35Z</updated>

		<summary type="html">&lt;p&gt;fixed server logs -&amp;gt; referral urls per source, moved nvd ref to correct claim&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 04:20, 29 March 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l56&quot;&gt;Line 56:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 56:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== Hardcoded secrets in mobile app (CVE-2025-2355) ===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== Hardcoded secrets in mobile app (CVE-2025-2355) ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The BlackVue v3.65 APK contains hardcoded BCS_TOKEN &amp;amp; SECRET_KEY values in plaintext&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;.&amp;lt;ref name=&quot;geochen&quot; /&amp;gt; These client secrets are transmitted via GET parameters, which means they appear in browser history, server logs, &amp;amp; corporate proxy logs.&amp;lt;ref name=&quot;geochen&quot; /&amp;gt; Anyone with access to these logs can extract the tokens&lt;/del&gt;.&amp;lt;ref name=&quot;nvd-2355&quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2025-2355 |title=CVE-2025-2355 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The BlackVue v3.65 APK contains hardcoded BCS_TOKEN &amp;amp; SECRET_KEY values in plaintext.&amp;lt;ref name=&quot;nvd-2355&quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2025-2355 |title=CVE-2025-2355 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;gt; These client secrets are transmitted via GET parameters, which means they appear in browser history, referral URLs, &amp;amp; proxy logs.&amp;lt;ref name=&quot;geochen&quot; /&lt;/ins&gt;&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== Unauthorized API calls (CVE-2025-2356) ===&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== Unauthorized API calls (CVE-2025-2356) ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key wiki:diff:1.41:old-48239:rev-48242:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Louis</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=BlackVue_firmware_security_vulnerabilities&amp;diff=48239&amp;oldid=prev</id>
		<title>Louis: new incident page for 7 firmware cves across dr750 and dr590x. two critical (9.8), dr750 unpatched since 2022. all sourced from nvd and github pocs.</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=BlackVue_firmware_security_vulnerabilities&amp;diff=48239&amp;oldid=prev"/>
		<updated>2026-03-29T04:13:42Z</updated>

		<summary type="html">&lt;p&gt;new incident page for 7 firmware cves across dr750 and dr590x. two critical (9.8), dr750 unpatched since 2022. all sourced from nvd and github pocs.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{#seo:&lt;br /&gt;
|description=Seven CVEs across BlackVue DR750 and DR590X dashcams allow remote firmware backdooring, unauthenticated access to recordings, and hardcoded API secrets. DR750 unpatched since 2022.&lt;br /&gt;
}}&lt;br /&gt;
{{IncidentCargo&lt;br /&gt;
|Company=BlackVue&lt;br /&gt;
|StartDate=2022-07-30&lt;br /&gt;
|EndDate=&lt;br /&gt;
|Status=Active&lt;br /&gt;
|ProductLine=&lt;br /&gt;
|Product=&lt;br /&gt;
|ArticleType=Product&lt;br /&gt;
|Type=Privacy,Repairability&lt;br /&gt;
|Description=Seven CVEs across DR750 &amp;amp; DR590X allow firmware backdooring, unauthenticated recording access, &amp;amp; hardcoded API secrets; DR750 unpatched since 2022&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;BlackVue firmware security vulnerabilities&amp;#039;&amp;#039;&amp;#039; are a set of 7 CVEs across 2 [[BlackVue]] dashcam models that allow attackers to upload backdoored firmware, access live video feeds &amp;amp; stored recordings without authentication, and exploit hardcoded API secrets embedded in plaintext in BlackVue&amp;#039;s mobile app.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot;&amp;gt;{{Cite web |url=https://github.com/eyJhb/blackvue-cve-2023 |title=BlackVue CVE-2023 - Security Vulnerabilities in BlackVue DR750 |author=eyJhb |date=2023 |website=GitHub |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;geochen&amp;quot;&amp;gt;{{Cite web |url=https://github.com/geo-chen/BlackVue |title=BlackVue Dashcam 590X Security Vulnerabilities |author=Geo Chen |date=2025-02-25 |website=GitHub |access-date=2026-03-28}}&amp;lt;/ref&amp;gt; The first 3 CVEs affecting the DR750 were reported to BlackVue on July 30, 2022.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; As of 2026, BlackVue has not patched the DR750 vulnerabilities, leaving roughly 300 internet-connected devices exposed.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Background ==&lt;br /&gt;
&lt;br /&gt;
BlackVue manufactures cloud-connected dashcams that provide remote access to live feeds, GPS tracking, &amp;amp; stored recordings through WiFi &amp;amp; cellular (LTE) connections. The DR750-2CH LTE model connects directly to the internet via its built-in LTE modem, making its services reachable without requiring proximity to the vehicle&amp;#039;s WiFi network.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Two independent security researchers audited BlackVue dashcams roughly 2.5 years apart. The first researcher (eyJhb) reported 3 vulnerabilities in the DR750 in July 2022. The second researcher (Geo Chen) disclosed 4 vulnerabilities in the DR590X in February 2025.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== DR750 vulnerabilities (CVE-2023-27746, CVE-2023-27747, CVE-2023-27748) ==&lt;br /&gt;
&lt;br /&gt;
The DR750-2CH LTE running firmware v1.012-eng contained 3 critical-to-high severity vulnerabilities that, chained together, allow full remote compromise of the device.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Weak default WiFi passphrase (CVE-2023-27746) ===&lt;br /&gt;
&lt;br /&gt;
The DR750&amp;#039;s default WiFi password uses only lowercase alphanumeric characters with a length of 8.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; This character set produces a keyspace small enough to brute-force from a captured WiFi handshake. The researcher estimated the password could be cracked in roughly 4 days using rented cloud hardware costing approximately 40 EUR.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; The NVD assigned this vulnerability a CVSS score of 9.8 (Critical).&amp;lt;ref name=&amp;quot;nvd-27746&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2023-27746 |title=CVE-2023-27746 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unauthenticated web server (CVE-2023-27747) ===&lt;br /&gt;
&lt;br /&gt;
A built-in web server on the DR750 exposes live video feeds, position &amp;amp; speed telemetry, stored recordings, &amp;amp; device configuration downloads without any authentication.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; Anyone on the same network (or anyone on the internet for LTE-connected models) can access these endpoints.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; The configuration download includes encrypted WiFi credentials.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; The NVD assigned a CVSS score of 7.5 (High).&amp;lt;ref name=&amp;quot;nvd-27747&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2023-27747 |title=CVE-2023-27747 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unauthenticated firmware upload (CVE-2023-27748) ===&lt;br /&gt;
&lt;br /&gt;
Port 9771/TCP on the DR750 hosts a FOTA (firmware over-the-air) service with no authentication &amp;amp; no firmware authenticity check.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; An attacker can upload custom firmware containing a backdoor.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; The dashcam has no firewall, so on LTE models this port is reachable from the public internet.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; Custom firmware persists even after a user reinstalls the official firmware, giving the attacker persistent root access to the device.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; The NVD assigned a CVSS score of 9.8 (Critical).&amp;lt;ref name=&amp;quot;nvd-27748&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2023-27748 |title=CVE-2023-27748 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== BlackVue&amp;#039;s response ===&lt;br /&gt;
&lt;br /&gt;
BlackVue acknowledged it would investigate but has not released a patch.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; At the time of disclosure, approximately 300 vulnerable DR750 devices were identified as publicly accessible on the internet.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== DR590X vulnerabilities (CVE-2025-7075, CVE-2025-7076, CVE-2025-2355, CVE-2025-2356) ==&lt;br /&gt;
&lt;br /&gt;
Security researcher Geo Chen disclosed 4 vulnerabilities in the BlackVue DR590X dashcam &amp;amp; its companion mobile app on February 25, 2025.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unauthenticated file upload (CVE-2025-7075) ===&lt;br /&gt;
&lt;br /&gt;
The DR590X exposes an &amp;lt;code&amp;gt;/upload.cgi&amp;lt;/code&amp;gt; endpoint at &amp;lt;code&amp;gt;http://10.99.77.1/upload.cgi&amp;lt;/code&amp;gt; with no authentication. Any device on the dashcam&amp;#039;s WiFi network can upload arbitrary files, including malware, to the dashcam.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; The NVD assigned a CVSS score of 8.8 (High).&amp;lt;ref name=&amp;quot;nvd-7075&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2025-7075 |title=CVE-2025-7075 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unauthenticated configuration modification (CVE-2025-7076) ===&lt;br /&gt;
&lt;br /&gt;
Through the same upload mechanism, an attacker can modify the dashcam&amp;#039;s configuration file without authentication. This allows disabling battery protection on the dashcam, which can drain the vehicle&amp;#039;s battery.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; The NVD assigned a CVSS score of 8.8 (High).&amp;lt;ref name=&amp;quot;nvd-7076&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2025-7076 |title=CVE-2025-7076 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Hardcoded secrets in mobile app (CVE-2025-2355) ===&lt;br /&gt;
&lt;br /&gt;
The BlackVue v3.65 APK contains hardcoded BCS_TOKEN &amp;amp; SECRET_KEY values in plaintext.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; These client secrets are transmitted via GET parameters, which means they appear in browser history, server logs, &amp;amp; corporate proxy logs.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; Anyone with access to these logs can extract the tokens.&amp;lt;ref name=&amp;quot;nvd-2355&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2025-2355 |title=CVE-2025-2355 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unauthorized API calls (CVE-2025-2356) ===&lt;br /&gt;
&lt;br /&gt;
Using tokens extracted from the APK or intercepted from GET parameters, an attacker can make API calls to delete devices from a user&amp;#039;s account &amp;amp; modify device settings without authorization.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; The userToken is transmitted via GET parameters rather than POST request bodies or authorization headers, exposing it to the same logging &amp;amp; interception risks as the hardcoded secrets.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;nvd-2356&amp;quot;&amp;gt;{{Cite web |url=https://nvd.nist.gov/vuln/detail/CVE-2025-2356 |title=CVE-2025-2356 Detail |website=National Vulnerability Database |access-date=2026-03-28}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Disclosure timeline ===&lt;br /&gt;
&lt;br /&gt;
Geo Chen reported the DR590X vulnerabilities to BlackVue on February 25, 2025. BlackVue acknowledged the report on February 26, 2025, &amp;amp; accepted the findings on March 5, 2025. CVEs were published on March 16, 2025.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Consumer impact ==&lt;br /&gt;
&lt;br /&gt;
Both sets of vulnerabilities expose dashcam owners to [[surveillance]] &amp;amp; vehicle tampering risks that cannot be mitigated through software settings.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; The DR750&amp;#039;s LTE connectivity means the firmware upload vulnerability (CVE-2023-27748) is exploitable remotely without physical proximity to the vehicle.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; A compromised dashcam can serve as a persistent surveillance device, streaming live video, audio, &amp;amp; GPS location data to an attacker.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The DR590X&amp;#039;s battery protection bypass (CVE-2025-7076) introduces a physical consequence: an attacker within WiFi range can disable the dashcam&amp;#039;s voltage cutoff, causing it to drain the vehicle&amp;#039;s 12V battery.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt; The hardcoded API secrets (CVE-2025-2355) &amp;amp; unauthorized API access (CVE-2025-2356) extend the attack surface beyond the local network to BlackVue&amp;#039;s cloud infrastructure, allowing remote account &amp;amp; device manipulation.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The DR750 vulnerabilities remain unpatched more than 3 years after the initial report to the vendor.&amp;lt;ref name=&amp;quot;eyjhb&amp;quot; /&amp;gt; BlackVue accepted the DR590X findings on March 5, 2025, but as of the CVE publication date had not announced fixes for those vulnerabilities either.&amp;lt;ref name=&amp;quot;geochen&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[BlackVue]]&lt;br /&gt;
* [[IoT device security]]&lt;br /&gt;
* [[Right to Repair]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:BlackVue]]&lt;br /&gt;
[[Category:Privacy]]&lt;br /&gt;
[[Category:IoT]]&lt;/div&gt;</summary>
		<author><name>Louis</name></author>
	</entry>
</feed>