

1.ReceiptReceiving and gathering reports of potential product security vulnerabilities


2.VerificationCoordinating with relevant teams to verify the vulnerability and conduct a risk assessment


3.RemediationAnalyzing the root cause of the vulnerability and implementing a fix


4.DisclosureProactively disclose vulnerability information and release fixed firmware


5.ImprovementEnhance vulnerability scanning capabilities and integrate them into product security requirements