<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/lantronix/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 22 Apr 2026 19:09:26 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/lantronix/" rel="self" type="application/rss+xml"/><item><title>BRIDGE:BREAK — 22 Flaws in Lantronix and Silex Serial-to-IP Converters, ~20,000 Devices Exposed</title><link>https://cybercrime.club/posts/bridgebreak-lantronix-silex-serial-ip-converters-22-cves/</link><pubDate>Wed, 22 Apr 2026 19:09:26 -0400</pubDate><guid>https://cybercrime.club/posts/bridgebreak-lantronix-silex-serial-ip-converters-22-cves/</guid><description>Forescout's Vedere Labs disclosed 22 CVEs in Lantronix EDS3000PS/EDS5000 and Silex SD330-AC serial-to-IP converters, including unauthenticated RCE, hard-coded keys, and null admin passwords. Roughly 20,000 devices sit directly on the public internet.</description><category>ot-security</category></item></channel></rss>