SUPPORT USER GUIDES All About firmware Basic Settings APPS Tools General question User Manual VIDEO REVIEWS

Eversolo Security Center


Security Breach Response

Eversolo attaches great importance to security issues, and we welcome security researchers to provide us with feedback on potential security issues to improve the security of our products and services.



Vulnerability Response and Disclosure Process

1. Recipient

Monitor and and assign received vulnerabilities in a timely manner.

2. Verification

Conduct technical verification of the effectiveness of vulnerabilities, confirming their exploitability and potential impact.

3. Solution Development

Provide effective fix solutions or risk remediations measures.

4. Affected Scope Confirmation

Investigate and confirm the complete scope of affected products.

5. Disclosure of Vulnerabilities

Review and publish security recommendations for the vulnerability after confirming the completion of all vulnerability response processes.



Vulnerability Submission

Please report any security vulnerability via email to: service@eversolo.com

The email should at least contain the following items:

- Organizational information and contact details;

- Affected products models, serial numbers/MAC, purchase date, where you purchased and firmware versions;

- Descriptions of the vulnerabilities;

- Exploitation methods of the vulnerabilities;

- Vulnerability disclosure plan;

- Other information (if any).



Attention

Although we encourage investigation of potential security breaches, we cannot tolerate any activity that may interfere with legitimate users or may violate applicable computer abuse, cyber security and data protection regulations. Therefore, the following activities are prohibited:

- Modification or destruction of data

- Service disruption or degradation, such as DoS

- Disclosure of personal, proprietary or financial information



Response Time

Upon receipt of the vulnerability you have submitted, we will send you a notification via email within 48 hours to commence the vulnerability response, along with confirmation and feedback on the nature of the vulnerability. The subsequent progress of the vulnerability will also be continuously updated in the email as soon as possible.

*Note: The actual vulnerability response time may vary depending on the risk level and complexity of the vulnerability.



Vulnerability Disclosure Instructions 

When an external party discovers or is concerned about a potential vulnerability, but we have not yet fully confirmed it, we will disclose basic information about the vulnerability and our investigation via email.

The vulnerability information shall be kept confidential until Eversolo releases the formal security advisory to the public.

When the vulnerability has been confirmed to be fixed, new firmware will be released, and a firmware update change log will be published, containing a description of the vulnerabilities that have been solved. *Eversolo Download Center



Product Support Policy

We strive to provide continuous security updates for our products. The security updates generally include the latest patches, vulnerability fixes, and other security improvements. We will generally maintain security updates for at least two years from the launch date of a product. However, the security update situation may vary by product, so please pay attention to our announcements. We will regularly publish and update information about the security of Eversolo products on this page to help you check your device’s security updates.

Product Type

Model Name

Release Date

Streamer

DMP-A6

05/2023

Streamer

DMP-A6 Master Edition

05/2023

Streamer

DMP-A8

11/2023

Power Amplifier

AMP-F2

12/2023

D/A Converter

DAC-Z6

10/2022

D/A Converter

DAC-Z8

10/2022

Portable Audio

H1

11/2022

Portable Audio

H2

11/2022

Note: Security update policies and products are subject to change and will be reviewed on a regular basis.