Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown

CVE-2024-21881

Disclosure Date: August 12, 2024 (last updated August 13, 2024)
Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x
0
Attacker Value
Unknown

CVE-2024-21880

Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x
Attacker Value
Unknown

CVE-2024-21879

Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
Attacker Value
Unknown

CVE-2024-21878

Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched.
Attacker Value
Unknown

CVE-2024-21877

Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and < 8.2.4225.
Attacker Value
Unknown

CVE-2024-21876

Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability via a URL parameter in Enphase IQ Gateway (formerly known as Envoy) allows an unautheticated attacker to access or create arbitratry files.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
Attacker Value
Unknown

CVE-2023-33869

Disclosure Date: June 20, 2023 (last updated October 08, 2023)
Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands.
Attacker Value
Unknown

CVE-2023-32274

Disclosure Date: June 20, 2023 (last updated October 08, 2023)
Enphase Installer Toolkit versions 3.27.0 has hard coded credentials embedded in binary code in the Android application. An attacker can exploit this and gain access to sensitive information.
Attacker Value
Unknown

CVE-2020-25754

Disclosure Date: June 16, 2021 (last updated November 28, 2024)
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Attempts to change the user password via passwd or other tools have no effect.
Attacker Value
Unknown

CVE-2020-25753

Disclosure Date: June 16, 2021 (last updated November 28, 2024)
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.