skip to Main Content
Security — FoxIoT OÜ

Report a Vulnerability

Please include the following information in your report:

  • Description of the vulnerability
  • Steps to reproduce
  • Affected product and version (if known)
  • Potential impact
  • Your contact information (for follow-up)

Coordinated Vulnerability Disclosure Policy

Scope — Included

  • Wolf Gateway hardware
  • FoxIoT bootloader/firmware/software (Wolf-OS and Wolf-App)
  • FoxIoT web properties

Scope — Excluded

  • Third-party applications on Wolf-OS
  • Third-party cloud services
  • Social engineering/phishing/physical attacks
  • DoS attacks on production systems

Our Commitments

Acknowledge your report

Within 48 hours (business days)

Initial assessment

Within 10 business days

Progress updates

At least every 30 days until resolved

Credit

In advisory upon fix publication (optional)

Disclosure Timeline

FoxIoT targets a 90-day disclosure window. For critical vulnerabilities, we provide:

  • 24-hour interim guidance
  • 7-day fix target

Safe Harbour

Researchers acting in good faith receive legal protection, provided they:

  • Avoid privacy violations
  • Avoid data destruction
  • Avoid service disruption
  • Disclose to us before public release

Security Advisories

No advisories published yet.

Wolf-App Mitigation Guidance

  1. Backup configuration via Wolf-App UI System menu
  2. Configure WireGuard VPN before closing ports
  3. Close HTTP Port 5080 via Firewall rules
  4. Close SSH Port 22 if affected
  5. Verify device isolation (UI unreachable, SSH refused, ping responsive, VPN functional)
  6. Check firmware version in System menu or via cat /VERSION
  7. Apply firmware update when available via System > Firmware Upload

Best Practices

  • Always use WireGuard VPN for remote access
  • Close ports 22 and 5080 on eth0 after VPN setup
  • Place device on separate network segment
  • Do not expose directly to internet
  • Keep firmware updated

LTE/4G Note: If your Wolf Gateway uses the LTE modem for connectivity, the device is already protected against incoming connections.

Default Firewall Configuration

Interface Policy Details
Default DROP All incoming blocked unless explicitly allowed
WireGuard ACCEPT Fully trusted VPN interfaces
Ethernet (eth0) Mixed SSH (22) and HTTP (5080) open only
LTE (usb0) DROP All incoming blocked
ICMP ACCEPT Ping allowed
Outgoing ACCEPT All outgoing allowed

Contact

FoxIoT OÜ, Pärnu mnt 148, Tallinn 11317, Estonia

EU Regulation 2024/2847 (Cyber Resilience Act) compliance.

Back To Top