A high-quality vulnerability report is great to help us confirm and address an issue more quickly, and could help you receive an eufy Security Bounty reward.
A complete report includes:
Eufy strongly recommends including a working exploit, rather than a basic proof of concept. We accept reports without this information, but reports with more details typically receive higher bounty rewards. If your report doesn't include the necessary information to allow us to reproduce the issue, we may not be able to accept your report or evaluate it for a bounty. In addition, you must meet the following requirements:
If you want to directly interact with the eufy security team regarding the discovered vulnerability, please submit the following information before proceeding.
Upload(doc, docs, pdf, 7z, rar, zip, gz, jpg, png, Maximux 8MB)
Additionally,If you are a white hat hacker and have registered on the HackerOne platform, you can click here to submit directly.
Submit reportOur rewards are based on severity per CVSS (the Common Vulnerability Scoring Standard). Please note these are general guidelines, and reward decisions are up to the discretion of Anker. Typical bug bounty rewards range from $100 to $8000, depending on their severity and asset tier. Submitted reports must be related to the ‘eufy’ brand. We reserve the right to accept and review any security report, including out of scope issues. This will be true regardless of the severity of vulnerability.
$100-$150
$300-$500
$800-$1200
$2000-$8000
Eufy will make the best efforts to meet the following response targets for hackers participating in our program, and eufy will make the best efforts to keep you informed throughout the process.
SLA in Business days
2 days
7 days
10 days
depends on severity and complexity
If you require any clarifications regarding the scope of the program (e.g., potential eufy's user data leaking in one of our third-party vendors) or face specific challenges when testing, you may email the eufy team at Data_Security_and_Privacy_Committee@anker-in.com. However, please do not escalate questions about the validity or bounties of your existing reports. Such emails will not be responded to and discussions should be done within the report itself. If you are unsure about a potential vulnerability, please submit the report to us and we will assess it accordingly.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.