top of page



Stop Hunting Bugs & Start Hunting Chains (based on Ni8mare)
This blog explores vulnerability chaining using an n8n Ni8mare -inspired attack path to demonstrate how seemingly harmless weaknesses can compound into something catastrophic. Let’s start with a hard truth. Most security programs are optimized for counting bugs not understanding compromise. We rank vulnerabilities by CVSS. We prioritize the red ones & close tickets. We feel productive but attackers don’t think in scores. They think in sequences. They don’t ask Is this bug cr
Om Mishra
5 days ago4 min read


CRAC Insights — 9th Feb — 16th Feb
Stay ahead of the curve with the latest from the CRAC Insights Newsletter! From critical zero-days to major infrastructure breaches, here is your quick briefing on the cybersecurity landscape: TOP 3 CVES CVE-2026–21531: Microsoft Azure SDK Remote Code Execution CVSS: 9.8 (Critical) Affected Versions Microsoft Azure SDK components (vulnerable builds prior to the February 2026 security updates; organizations using unpatched SDK integrations are at risk). Description A critical
CRAC Learning
Feb 175 min read


Smart Home Security Research — CVE-2026–0918 Assigned
From having online meetings to getting real CVEs, the CRAC Learning team did it all! We discovered a Denial-of-Service vulnerability in the HTTP service of the TP-Link Tapo C100 v5 IP camera. Sending a POST request with an excessively large Content-Length header causes the main HTTP process to crash, freezing video and audio streams and forcing a restart. TP-Link acknowledged and published a fix; the issue was assigned CVE-2026–0918 and a High score (CVSS v4.0 7.1). Tapo came
Azim Javed
Feb 112 min read


Smart Security Research Diaries: Attacking the Internet of Things
Before reading this part, go over our previous blog - https://www.crac-learning.com/post/smart-security-research-diaries-defending-the-internet-of-things Then I started the Phase-1 of Smart Home Security Research Program by CRAC Learning with great enthusiasm & aspirations to find real vulnerabilities, not just solving TryHackMe labs. When I found that I'll be attacking the TP-Link Tapo C100 IP Camera, the first thing I did was Threat Modelling. I dived deep into gathering pa
Azim Javed
Feb 104 min read
bottom of page





