1. Acknowledgment statement to vulnerability disclosure users
Thank you for taking the initiative to pay attention to and disclose potential security
vulnerabilities in the process of using this vehicle product - your feedback is an important help for
us to discover product risks and improve system protection capabilities, directly promote the
iterative optimization of product security performance, and effectively protect the car security
and data rights and interests of all users.

2. User security vulnerability feedback guidelines 
If you find security vulnerabilities or problems when using our products, you can report back
to us in time, and we will strive to solve your problems.
1. Priority feedback channel: Feedback to us through our email support@essgoo.com or scan the
following QR code to feedback the security vulnerabilities you encountered, and the subject of
the email should be marked with "[Vehicle Security Vulnerability Feedback] + Model +
Vulnerability Scenario".
2. Feedback information requirements: It must include three core contents: specific scenarios 
triggered by vulnerabilities (such as "third-party apps can read the address book after the car is
connected to the mobile phone hotspot"), detailed reproduction steps, and possible risk impacts
of vulnerabilities (such as data leakage, loss of control, etc.), which can be supported by
screenshots or videos.
3. Notice after feedback: We will notify you of the vulnerability handling through your email, 
please pay attention to checking the email information. Please note that do not disclose
vulnerability details through unofficial channels (such as social platforms, third-party forums) to
avoid malicious exploitation.

3. Vulnerability feedback handling mechanism
1. Response timeliness: After receiving the email, we will complete the preliminary verification of
the feedback information within 1-3 working days and send a "vulnerability acceptance notice" to
the user to clarify whether it is included in the formal handling process.
2. Processing process:
- Technical verification: Confirm the vulnerabilities that need to be addressed, and our security
technical team will reproduce the vulnerabilities within 3 working days and assess the risk level
(low/medium/high).
- Scenario development: Priority will be given to the registration of the risk assessment from high
to low, and the progress will be reported to the customer within 2-3 weeks until the vulnerability
is fixed.
- Restoration implementation: Users will be notified through the original feedback channel within 1 working day after the repair is completed.
3. User communication: If vulnerability information needs to be supplemented during the
processing process, the user will be contacted via email, and the progress will be synchronized at
least twice during the entire processing cycle. After the vulnerability fix is completed, users will
be invited to assist in verifying the fix effect to ensure that the problem is completely resolved.

4. Privacy and confidentiality
(1) We attach great importance to the privacy of your information, and when you report security
vulnerabilities or problems to us, we promise to keep your information strictly confidential and
will not disclose your personal information to third parties unless you agree.
(2) We will also keep your security questions strictly confidential until the problem is resolved.

5. Product security update guarantee
To ensure continuous security protection, we provide product security update
support for our products for a certain period of time.
1. Long-term support: Each product is guaranteed to receive security update
support for at least 3 years from the date of the first product release.
2. Update Notifications: When new security updates are available, we will
send them through appropriate channels such as email or official
websiteNotify users.

Product model
Product Name
Last published
 Support deadlines
AR9001
Vehicle Player 
2025/6/10
2028/6/9
AR9002
Vehicle Player 
2025/6/10
2028/6/9
AR1001
Vehicle Player
2025/6/10
2028/6/9
AZ0001
Vehicle Player
2025/6/10
2028/6/9
AR7001
Vehicle Player
2025/6/10
2028/6/9
AR7002
Vehicle Player
2025/6/10
2028/6/9
7018B
Vehicle Player
2025/6/10
2028/6/9
7035W
Vehicle Player
2025/6/10
2028/6/9
TS0002
Vehicle Player
2025/6/10
2028/6/9
m4
Vehicle Player
2025/6/10
2028/6/9
SWM5017
Vehicle Player
2025/6/10
2028/6/9
AR7005
Vehicle Player
2025/6/10
2028/6/9
5188w
Vehicle Player
2025/6/10
2028/6/9
9016A
Vehicle Player
2025/6/10
2028/6/9
9618
Vehicle Player
2025/6/10
2028/6/9
FR7002
Vehicle Player
2025/6/10
2028/6/9
FS0002
Vehicle Player
2025/6/10
2028/6/9
AR7003
Vehicle Player
2025/6/10
2028/6/9
AR1002
Vehicle Player
2025/6/10
2028/6/9
AR8001
Vehicle Player
2025/6/10
2028/6/9
AS7001c
Vehicle Player
2025/6/10
2028/6/9
FR7003
Vehicle Player
2025/6/10
2028/6/9
LZ0001
Vehicle Player
2025/6/10
2028/6/9
AZ0002
Vehicle Player
2025/6/10
2028/6/9
FS9001
Vehicle Player
2025/6/10
2028/6/9
AR7006
Vehicle Player
2025/6/10
2028/6/9
AR9003
Vehicle Player
2025/6/10
2028/6/9
TS0003
Vehicle Player
2025/6/10
2028/6/9
AR1003
Vehicle Player
2025/6/10
2028/6/9
AZ0003
Vehicle Player
2025/6/10
2028/6/9

 

Disclaimer:
1. The information on this page is for informational purposes only. Please be
guided by the security updates you actually receive through your device.

2. Delivery times for security patches may vary by region and device model. 

3. Security update policies and quantities of device models are subject to change 
and will be reviewed regularly.