CVE-2012-5862

These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sinapsitech:sinapsi_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:sinapsitech:esolar_duo_photovoltaic_system_monitor:-:*:*:*:*:*:*:*
cpe:2.3:h:sinapsitech:esolar_light_photovoltaic_system_monitor:-:*:*:*:*:*:*:*
cpe:2.3:h:sinapsitech:esolar_photovoltaic_system_monitor:-:*:*:*:*:*:*:*

History

08 Jul 2025, 16:15

Type Values Removed Values Added
References
  • () https://www.cisa.gov/news-events/ics-advisories/icsa-12-325-01 -
CWE CWE-259
Summary (en) login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64. (en) These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.

Information

Published : 2012-11-23 12:09

Updated : 2025-07-08 16:15


NVD link : CVE-2012-5862

Mitre link : CVE-2012-5862

CVE.ORG link : CVE-2012-5862


JSON object : View

Products Affected

sinapsitech

  • sinapsi_firmware
  • esolar_photovoltaic_system_monitor
  • esolar_duo_photovoltaic_system_monitor
  • esolar_light_photovoltaic_system_monitor
CWE
CWE-259

Use of Hard-coded Password

CWE-310

Cryptographic Issues