Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown
CVE-2024-21881
Disclosure Date: August 12, 2024 (last updated August 13, 2024)
Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x
0
Attacker Value
Unknown
CVE-2024-21880
Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x
0
Attacker Value
Unknown
CVE-2024-21879
Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
0
Attacker Value
Unknown
CVE-2024-21878
Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched.
0
Attacker Value
Unknown
CVE-2024-21877
Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and < 8.2.4225.
0
Attacker Value
Unknown
CVE-2024-21876
Disclosure Date: August 12, 2024 (last updated August 24, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability via a URL parameter in Enphase IQ Gateway (formerly known as Envoy) allows an unautheticated attacker to access or create arbitratry files.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
0
Attacker Value
Unknown
CVE-2023-33869
Disclosure Date: June 20, 2023 (last updated October 08, 2023)
Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands.
0
Attacker Value
Unknown
CVE-2023-32274
Disclosure Date: June 20, 2023 (last updated October 08, 2023)
Enphase Installer Toolkit versions 3.27.0 has hard coded credentials embedded in binary code in the Android application. An attacker can exploit this and gain access to sensitive information.
0
Attacker Value
Unknown
CVE-2020-25754
Disclosure Date: June 16, 2021 (last updated November 28, 2024)
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Attempts to change the user password via passwd or other tools have no effect.
0
Attacker Value
Unknown
CVE-2020-25753
Disclosure Date: June 16, 2021 (last updated November 28, 2024)
An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.
0