Growatt | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

Kategori: Growatt - CVE listesi
VENDOR 35 kayıt
High CVSS: 8.6

CVE-2025-36753

The SWD debug interface on the Growatt ShineLan-X communication dongle is available by default, allowing an attacker to attain debug access to the device and to extracting secrets or domains from within the device
Critical CVSS: 9.4

CVE-2025-36752

Growatt ShineLan-X communication dongle has an undocumented backup account with undocumented credentials which allows significant level access to the device, such as allowing any attacker to access the Setting Center. This means that this i…
High CVSS: 8.5

CVE-2025-36750

ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the Plant Name field. A HTML payload will be displayed on the plant management page via a direct post. This may allow attackers to force a legitimate user’s browser’s…
High CVSS: 8.4

CVE-2025-36748

ShineLan-X contains a stored cross site scripting (XSS) vulnerability in the local configuration web server. The JavaScript code snippet can be inserted in the communication module’s settings center. This may allow attackers to force a legi…
Critical CVSS: 9.4

CVE-2025-36747

ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to dev…
Medium CVSS: 6.9

CVE-2025-31950

An unauthenticated attacker can obtain EV charger energy consumption information of other users.
Medium CVSS: 6.9

CVE-2025-31945

An unauthenticated attacker can obtain other users' charger information.
Medium CVSS: 6.9

CVE-2025-31654

An attacker can get information about the groups of the smart home devices for arbitrary users (i.e., "rooms").
Medium CVSS: 6.9

CVE-2025-31360

Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users.
Medium CVSS: 6.9

CVE-2025-31147

Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.
Medium CVSS: 6.9

CVE-2025-30512

Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off).
Critical CVSS: 9.3

CVE-2025-30510

An attacker can upload an arbitrary file instead of a plant image.
Medium CVSS: 6.9

CVE-2025-30257

Unauthenticated attackers can retrieve serial number of smart meters associated to a specific user account.
Medium CVSS: 6.9

CVE-2025-27929

Unauthenticated attackers can retrieve full list of users associated with arbitrary accounts.
Medium CVSS: 6.9

CVE-2025-27927

An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.
Medium CVSS: 6.9

CVE-2025-27719

Unauthenticated attackers can query an API endpoint and get device details.
Medium CVSS: 6.9

CVE-2025-27575

An unauthenticated attacker can obtain EV charger version and firmware upgrading history by knowing the charger ID.
Medium CVSS: 6.9

CVE-2025-27565

An unauthenticated attacker can delete any user's "rooms" by knowing the user's and room IDs.
Medium CVSS: 6.9

CVE-2025-27561

Unauthenticated attackers can rename "rooms" of arbitrary users.
Medium CVSS: 6.9

CVE-2025-26857

Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).