Security Response Center

Security Response Center | VStarcam

About VSRC

The VStarcam Security Response Center is dedicated to safeguarding product and user data security, working hand-in-hand with security researchers to build a safer IoT ecosystem.

Our Mission

As a leading global provider of smart security solutions, VStarcam considers product security a core responsibility. VSRC handles the receipt, processing, and response of vulnerability reports from external researchers and users.

Collaboration

We invite security researchers worldwide to participate in vulnerability discovery and reporting. Every valid security report will receive our acknowledgment and appreciation.

Scope

Covers all VStarcam IP cameras, NVRs, cloud platforms, mobile apps (Eye4 / O-KAM Pro), and related IoT devices.

Report a Vulnerability

Found a security issue? Please submit your report through the following channel.

Response Time Within 5 Business Days
Reply Method Email

You may submit potential security vulnerabilities to the email above. We will keep you updated on the progress of the fix via email. Actual response time may vary depending on the severity and complexity of the issue.

Report Guidelines

To help us process your report efficiently, please include the following information.

01

Description

Clearly describe the vulnerability type, scope of impact, and potential harm

02

Affected Product

Product model, firmware version, app version, or cloud platform URL involved

03

Steps to Reproduce

Detailed reproduction steps, including tools and environment configuration

04

Proof of Concept

Screenshots, videos, PoC code, or other evidence of the vulnerability

05

Impact Assessment

Your assessment of the severity and potential security impact

06

Contact Info

Your email address so we can communicate the progress of the fix

Response Process

The complete workflow from vulnerability submission to resolution.

1
T+0

Submission

Security researcher submits a vulnerability report to security@vstarcam.com

2
T+1 Business Day

Acknowledgment

VSRC team confirms receipt and sends a confirmation email with a tracking ID

3
T+3 Business Days

Assessment

Security team evaluates the vulnerability, reproduces the issue, and determines the risk level

4
T+5 Business Days

Feedback

Reporter receives the assessment result and estimated remediation plan

5
Varies by Complexity

Fix & Release

Vulnerability is patched, security update is released, and the reporter is notified

Severity Classification

Vulnerabilities are classified based on the CVSS scoring standard.

SeverityCVSS ScoreExamples
Critical9.0 – 10.0Remote code execution, full device takeover, mass user data breach, cloud platform compromise
High7.0 – 8.9Unauthorized access to sensitive data, privilege escalation, unauthorized video stream access, authentication bypass
Medium4.0 – 6.9Stored XSS, sensitive information disclosure, CSRF attacks, insecure default configurations
Low0.1 – 3.9Reflected XSS, low-sensitivity information disclosure, URL redirect vulnerabilities

Safe Harbor Policy

We are committed to protecting the rights of good-faith security researchers.

We Encourage

  • Responsible discovery and reporting of security vulnerabilities
  • Keeping vulnerability details confidential until a fix is released
  • Testing only within authorized scope
  • Using your own test accounts for verification
  • Notifying us as soon as a vulnerability is discovered

Please Do Not

  • Perform denial-of-service (DoS) attacks on production systems
  • Access, modify, or delete other users’ data
  • Publicly disclose vulnerability details before a fix is available
  • Use vulnerabilities for any illegal activities
  • Conduct social engineering attacks against VStarcam employees

Security Advisories

Publicly disclosed security vulnerabilities and their remediation status. Advisories are published after fixes are released.

ID Title Published Status
No security advisories have been published yet.

* Vulnerability details are disclosed after the fix is released and the reporter is notified.

Acknowledgements

We thank the following security researchers for their contributions to VStarcam product security. View full Hall of Fame →

Year Researcher Contributions Status
2026 Omri 1 Acknowledged

* After submitting a valid vulnerability report, you will be acknowledged here upon confirmation. See the Acknowledgements page for details.

Found a Security Vulnerability?

Thank you for helping us protect millions of users worldwide. Please send your report to:

security@vstarcam.com

We commit to responding within 5 business days

About This Page

The VStarcam Security Response Center (VSRC) sincerely thanks all researchers who responsibly report security vulnerabilities. Your contributions help us continuously improve product security and protect the privacy and data of users worldwide.

1Acknowledged Researchers
1Valid Reports
0Critical/High Vulnerabilities
1Vulnerabilities Fixed

Hall of Fame

Researchers who have made outstanding contributions to VStarcam security, listed by year.

2026 2025
Outstanding Contributors ≥ 3 Critical/High vulnerabilities
Excellent Contributors ≥ 1 High or ≥ 3 Medium vulnerabilities
Appreciated Contributors ≥ 1 valid vulnerability report
O
Omri
Independent Security Researcher
Reports: 1 Date: 2026-03-30

Acknowledgement Policy

Criteria and rules for inclusion in the security acknowledgements list.

Eligibility Criteria

  • The submitted vulnerability is confirmed as valid by VSRC
  • The report meets our guidelines and includes complete reproduction steps
  • Vulnerability details are not publicly disclosed before the fix is released
  • The vulnerability is not exploited for illegal activities or to harm users
  • Only the first reporter of a given vulnerability is acknowledged
  • The acknowledgements list is updated quarterly

Tier Descriptions

  • Outstanding Contributors (Gold) — Submitted 3 or more Critical/High vulnerabilities, or discovered issues with significant impact
  • Excellent Contributors (Silver) — Submitted 1 or more High vulnerabilities, or 3 or more Medium vulnerabilities
  • Appreciated Contributors (Bronze) — Submitted 1 or more valid vulnerability reports

Become a Security Contributor

Discover and responsibly report security vulnerabilities — your name will appear on our Hall of Fame.

Submit a Report

Learn more by clicking the “Response Center” tab above