Vulnerability Handling Guidelines

Page 1

Vulnerability Disclosure Policy

Formovie attaches great importance to the security of its products and welcomes reports from all parties regarding any potential security risks. To this end, Formovie and its sales companies collect information on security vulnerabilities related to products and services and promptly assess their potential impact. We will take necessary measures as appropriate, committed to continuously improving product security protection capabilities, enabling customers to use our products and services with greater peace of mind and reliability.

 

1. Vulnerability Handling Process

Receive Vulnerability -- Submitter provides detailed information about the vulnerability

Investigation & Verification -- Verify the vulnerability and confirm its exploitability and impact

Affected Product Assessment -- Investigate and confirm the full range of affected products

Solution Development -- Provide effective fixes or risk mitigation measures

Vulnerability Remediation -- Push OTA security patch updates or publish security advisories online

 

2. Reporting a Vulnerability

If you discover a new vulnerability (a previously undisclosed vulnerability) in our products, please submit it online or email us at support@wemax-eu.com.

 

3. Response Timeline

Upon receiving your vulnerability report, we will send you an acknowledgment with relevant information within 48 hours. Progress on the development of a solution will be updated via email as soon as possible.

Critical/High/Medium severity vulnerabilities will be fixed within 90 business days, and Low severity vulnerabilities within 180 business days. Vulnerability fixes may be subject to environmental or hardware limitations, and the actual remediation time will be confirmed based on specific circumstances.

 

We sincerely thank those who take the time and effort to report vulnerabilities according to this policy. However, we do not offer any monetary rewards for vulnerability reports. Thank you for your understanding.

Page 2

Security Updates

 

Vulnerability Notice | Name | Model | Date

Page 3

Security Update Timeline

 

Name | Model | Deadline