High
CVSS: 8.6
The SWD debug interface on the Growatt ShineLan-X communication dongle is available by default, allowing an attacker to attain debug access to the device and to extracting secrets or domains from within the device
Critical
CVSS: 9.4
Growatt ShineLan-X communication dongle has an undocumented backup account with undocumented credentials which allows significant level access to the device, such as allowing any attacker to access the Setting Center. This means that this i…
High
CVSS: 8.5
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the Plant Name field. A HTML payload will be displayed on the plant management page via a direct post. This may allow attackers to force a legitimate user’s browser’s…
High
CVSS: 8.4
ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the local configuration web server. The JavaScript code snippet can be inserted in the communication module’s settings center. This may allow attackers to force a legi…
Critical
CVSS: 9.4
ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to dev…
Medium
CVSS: 6.9
An unauthenticated attacker can obtain EV charger energy consumption information of other users.
Medium
CVSS: 6.9
An unauthenticated attacker can obtain other users' charger information.
Medium
CVSS: 6.9
An attacker can get information about the groups of the smart home devices for arbitrary users (i.e., "rooms").
Medium
CVSS: 6.9
Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users.
Medium
CVSS: 6.9
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.
Medium
CVSS: 6.9
Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off).
Critical
CVSS: 9.3
An attacker can upload an arbitrary file instead of a plant image.
Medium
CVSS: 6.9
Unauthenticated attackers can retrieve serial number of smart meters associated to a specific user account.
Medium
CVSS: 6.9
Unauthenticated attackers can retrieve full list of users associated with arbitrary accounts.
Medium
CVSS: 6.9
An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.
Medium
CVSS: 6.9
Unauthenticated attackers can query an API endpoint and get device details.
Medium
CVSS: 6.9
An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID.
Medium
CVSS: 6.9
An unauthenticated attacker can delete any user's "rooms" by knowing the user's and room IDs.
Medium
CVSS: 6.9
Unauthenticated attackers can rename "rooms" of arbitrary users.
Medium
CVSS: 6.9
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).