Vulnerabilities (CVE)

Filtered by vendor Sungrowpower Subscribe
Total 15 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-50690 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-05-29 N/A 6.5 MEDIUM
SunGrow WiNet-SV200.001.00.P027 and earlier versions contains a hardcoded password that can be used to decrypt all firmware updates.
CVE-2024-50692 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-05-29 N/A 5.4 MEDIUM
SunGrow WiNet-SV200.001.00.P027 and earlier versions contains hardcoded MQTT credentials that allow an attacker to send arbitrary commands to an arbitrary inverter. It is also possible to impersonate the broker, because TLS is not used to identify the real MQTT broker. This means that MQTT communications are vulnerable to MitM attacks at the TCP/IP level.
CVE-2024-50694 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-05-29 N/A 9.8 CRITICAL
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow.
CVE-2024-50695 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-05-29 N/A 9.8 CRITICAL
SunGrow WiNet-SV200.001.00.P027 and earlier versions is vulnerable to stack-based buffer overflow when parsing MQTT messages, due to missing MQTT topic bounds checks.
CVE-2024-50697 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-05-29 N/A 8.1 HIGH
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow.
CVE-2024-50698 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-05-29 N/A 9.8 CRITICAL
SunGrow WiNet-SV200.001.00.P027 and earlier versions is vulnerable to heap-based buffer overflow due to bounds checks of the MQTT message content.
CVE-2024-50684 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 6.5 MEDIUM
SunGrow iSolarCloud Android app V2.1.6.20241017 and prior uses an insecure AES key to encrypt client data (insufficient entropy). This may allow attackers to decrypt intercepted communications between the mobile app and iSolarCloud.
CVE-2024-50685 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.1 CRITICAL
SunGrow iSolarCloud before the October 31, 2024 remediation, is vulnerable to insecure direct object references (IDOR) via the powerStationService API model.
CVE-2024-50686 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.1 CRITICAL
SunGrow iSolarCloud before the October 31, 2024 remediation is vulnerable to insecure direct object references (IDOR) via the commonService API model.
CVE-2024-50687 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.1 CRITICAL
SunGrow iSolarCloud before the October 31, 2024 remediation is vulnerable to insecure direct object references (IDOR) via the devService API model.
CVE-2024-50688 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.8 CRITICAL
SunGrow iSolarCloud Android application V2.1.6.20241017 and prior contains hardcoded credentials. The application (regardless of the user account) and the cloud uses the same MQTT credentials for exchanging the device telemetry.
CVE-2024-50689 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.1 CRITICAL
SunGrow iSolarCloud before the October 31, 2024 remediation is vulnerable to insecure direct object references (IDOR) via the orgService API model.
CVE-2024-50691 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 7.4 HIGH
SunGrow iSolarCloud Android app V2.1.6.20241104 and prior suffers from Missing SSL Certificate Validation. The app explicitly ignores certificate errors and is vulnerable to MiTM attacks. Attackers can impersonate the iSolarCloud server and communicate with the Android app.
CVE-2024-50693 1 Sungrowpower 1 Isolarcloud 2025-04-07 N/A 9.1 CRITICAL
SunGrow iSolarCloud before the October 31, 2024 remediation is vulnerable to insecure direct object references (IDOR) via the userService API model.
CVE-2024-50696 1 Sungrowpower 2 Winet-s, Winet-s Firmware 2025-04-07 N/A 7.5 HIGH
SunGrow WiNet-S V200.001.00.P025 and earlier versions is missing integrity checks for firmware upgrades. Sending a specific MQTT message allows an update to an inverter or a WiNet connectivity dongle with a bogus firmware file that is located on attacker-controlled server.