![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-21879 – URL parameter manipulations allows an authenticated attacker to execute arbitrary OS commands in Enphase IQ Gateway v4.x to v8.x and < v8.2.4225
https://notcve.org/view.php?id=CVE-2024-21879
10 Aug 2024 — Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225. • https://csirt.divd.nl/CVE-2024-21879 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-21877 – Insecure File Generation Based on User Input in Enphase IQ Gateway version 4.x to 8.x and < 8.2.4225
https://notcve.org/view.php?id=CVE-2024-21877
10 Aug 2024 — Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and < 8.2.4225. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authenticatio... • https://csirt.divd.nl/CVE-2024-21877 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-21878 – Command Injection through Unsafe File Name Evaluation in internal script in Enphase IQ Gateway v4.x to and including 8.x
https://notcve.org/view.php?id=CVE-2024-21878
10 Aug 2024 — Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched. • https://csirt.divd.nl/CVE-2024-21878 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-21880 – URL parameter manipulations allows an authenticated attacker to execute arbitrary OS commands in Enphase IQ Gateway version 4.x <= 7.x
https://notcve.org/view.php?id=CVE-2024-21880
10 Aug 2024 — Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x • https://csirt.divd.nl/CVE-2024-21880 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-21881 – Upload of encrypted packages allows authenticated command execution in Enphase IQ Gateway v4.x and v5.x
https://notcve.org/view.php?id=CVE-2024-21881
10 Aug 2024 — Inadequate Encryption Strength vulnerability allow an authenticated attacker to execute arbitrary OS Commands via encrypted package upload.This issue affects Envoy: 4.x and 5.x • https://csirt.divd.nl/CVE-2024-21881 • CWE-326: Inadequate Encryption Strength •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-33869 – Enphase Envoy OS Command Injection
https://notcve.org/view.php?id=CVE-2023-33869
20 Jun 2023 — Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-171-01 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-25755
https://notcve.org/view.php?id=CVE-2020-25755
16 Jun 2021 — An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter. Se detectó un problema en los dispositivos Enphase Envoy versiones R3.x y D4.x (y otros actuales). La función upgrade_start en la ruta /installer/upgrade_start permite a usuarios autenticados remotos ejecutar comandos arbitrarios por medio del parámetro force • https://enphase.com/en-us/products-and-services/envoy-and-combiner • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-25754
https://notcve.org/view.php?id=CVE-2020-25754
16 Jun 2021 — An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Attempts to change the user password via passwd or other tools have no effect. • https://enphase.com/en-us/products-and-services/envoy-and-combiner • CWE-916: Use of Password Hash With Insufficient Computational Effort •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-25753
https://notcve.org/view.php?id=CVE-2020-25753
16 Jun 2021 — An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Se detectó un problema en los dispositivos Enphase Envoy versiones R3.x y D4.x con software versión v3. La contraseña de administrador predeterminada es ajustada en los últimos 6 dígitos del número de serie. • https://enphase.com/en-us/products-and-services/envoy-and-combiner •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-25752
https://notcve.org/view.php?id=CVE-2020-25752
16 Jun 2021 — An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords. • https://enphase.com/en-us/products-and-services/envoy-and-combiner • CWE-798: Use of Hard-coded Credentials •