Cyber Security | OWASP IoT Top-10 2020

1.Weak, Guessable, or Hardcoded Passwords :-

Use of:
● Easily bruteforced
● Publicly available
● Unchangeable credentials
Including backdoors in firmware or client software that
grants unauthorized access