Vulnerability Disclosure Policy
Version 1.0
This Vulnerability Disclosure Policy establishes the principles
and procedures by which Marstek receives, evaluates, manages, and
remediates security vulnerabilities.
The purpose of this policy is to enhance product security, protect
user data, and maintain the integrity and reliability of Marstek
products and services.
This policy applies to all:
Marstek hardware products
Marstek mobile and Web software
Cloud services, APIs, and firmware associated with
Marstek
Any third-party components integrated into the above
systems
It is applicable to users, developers, external security
researchers, partners, and any individual or entity reporting a
potential security vulnerability.
Marstek is committed to safeguarding user privacy and maintaining
strong security standards. We encourage good-faith reports of
potential security vulnerabilities and pledge to evaluate and
remediate valid submissions promptly, transparently, and
responsibly.
We do not tolerate malicious activity, exploitation, or
unauthorized access attempts. Reports must be submitted through
the approved process outlined in this policy.
Individuals who believe they have identified a security
vulnerability must submit their report through the
Vulnerability Report Form
available on the Marstek Vulnerability Management page.
Reports should include, to the extent possible:
A clear description of the vulnerability
Steps to reproduce
Affected product models, versions, or firmware
Any supporting technical details, logs, or evidence
All information submitted will be handled
confidentially.
Marstek follows an internal vulnerability management process
aligned with
ISO/IEC 30111
and evaluates all reported issues using
CVSS v3.1
scoring standards.
The process includes the following stages:
Severity Level
Expected Remediation Time
Critical
Within 3 business days
High / Medium
Within 30 business days
Low
Within 180 business days
Actual timelines may vary due to real-world complexity, product
dependencies, or hardware constraints.
Marstek will acknowledge receipt of all valid reports and may
provide follow-up communication where appropriate.
Public disclosure of vulnerabilities may occur only after
remediation is completed and must follow coordinated disclosure
principles.
Reporters must avoid:
Exploiting or abusing the vulnerability
Accessing user data or systems beyond what is necessary for
proof-of-concept
Publicly disclosing information before remediation is
complete
Performing actions that degrade service availability or product
performance
Good-faith research conducted within these boundaries will not be
subject to legal action.
We thank all individuals and organizations who responsibly report
security vulnerabilities. Your efforts directly contribute to
improving the safety and reliability of Marstek products and
protecting our global user community.