Lucene search

K
EnphaseEnvoy Firmware

5 matches found

CVE
CVE
added 2021/06/16 7:15 p.m.57 views

CVE-2020-25755

An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.

8.8CVSS8.7AI score0.03118EPSS
CVE
CVE
added 2021/06/16 7:15 p.m.51 views

CVE-2020-25752

An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The...

5.3CVSS5.4AI score0.00797EPSS
CVE
CVE
added 2021/06/16 7:15 p.m.46 views

CVE-2020-25753

An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.

9.8CVSS9.5AI score0.01676EPSS
CVE
CVE
added 2023/06/20 8:15 p.m.32 views

CVE-2023-33869

Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands.

9.8CVSS8.3AI score0.00251EPSS
CVE
CVE
added 2021/06/16 7:15 p.m.31 views

CVE-2020-25754

An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an un...

7.5CVSS7.8AI score0.00352EPSS