In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow.
References
Link | Resource |
---|---|
https://en.sungrowpower.com/security-notice-detail-2/5961 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
29 May 2025, 16:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sungrowpower winet-s
Sungrowpower winet-s Firmware Sungrowpower |
|
References | () https://en.sungrowpower.com/security-notice-detail-2/5961 - Vendor Advisory | |
CPE | cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:* cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:* |
05 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-121 | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
24 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-24 23:15
Updated : 2025-05-29 16:02
NVD link : CVE-2024-50694
Mitre link : CVE-2024-50694
CVE.ORG link : CVE-2024-50694
JSON object : View
Products Affected
sungrowpower
- winet-s
- winet-s_firmware
CWE
CWE-121
Stack-based Buffer Overflow