SunGrow iSolarCloud Android application V2.1.6.20241017 and prior contains hardcoded credentials. The application (regardless of the user account) and the cloud uses the same MQTT credentials for exchanging the device telemetry.
References
Link | Resource |
---|---|
https://en.sungrowpower.com/security-notice-detail-2/6122 | Vendor Advisory |
Configurations
History
07 Apr 2025, 18:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sungrowpower
Sungrowpower isolarcloud |
|
CPE | cpe:2.3:a:sungrowpower:isolarcloud:*:*:*:*:*:android:*:* | |
References | () https://en.sungrowpower.com/security-notice-detail-2/6122 - Vendor Advisory |
04 Mar 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
26 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 21:15
Updated : 2025-04-07 18:51
NVD link : CVE-2024-50688
Mitre link : CVE-2024-50688
CVE.ORG link : CVE-2024-50688
JSON object : View
Products Affected
sungrowpower
- isolarcloud
CWE
CWE-798
Use of Hard-coded Credentials