
CVE-2020-25753
https://notcve.org/view.php?id=CVE-2020-25753
16 Jun 2021 — An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Se detectó un problema en los dispositivos Enphase Envoy versiones R3.x y D4.x con software versión v3. La contraseña de administrador predeterminada es ajustada en los últimos 6 dígitos del número de serie. • https://enphase.com/en-us/products-and-services/envoy-and-combiner •

CVE-2020-25752
https://notcve.org/view.php?id=CVE-2020-25752
16 Jun 2021 — An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords. • https://enphase.com/en-us/products-and-services/envoy-and-combiner • CWE-798: Use of Hard-coded Credentials •

CVE-2019-7676
https://notcve.org/view.php?id=CVE-2019-7676
09 Feb 2019 — A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account. Se ha descubierto una vulnerabilidad de contraseña débil en Enphase Envoy R3.*.*. Se puede iniciar sesión mediante el puerto TCP 8888 con la contraseña "admin" para la cuenta de administrador. • https://github.com/pudding2/enphase-energy/blob/master/weak_password.txt • CWE-521: Weak Password Requirements •

CVE-2019-7677
https://notcve.org/view.php?id=CVE-2019-7677
09 Feb 2019 — XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888. Existe Cross-Site Scripting (XSS) en Enphase Envoy R3.*.* mediante el parámetro profileName en el URI /home en el puerto TCP 8888. • https://github.com/pudding2/enphase-energy/blob/master/XSS-exp.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-7678
https://notcve.org/view.php?id=CVE-2019-7678
09 Feb 2019 — A directory traversal vulnerability was discovered in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css on TCP port 8888. Se ha descubierto una vulnerabilidad de salto de directorio en Enphase Envoy R3.*.* mediante images/, include/, include/js o include/css en el puerto TCP 8888. • https://github.com/pudding2/enphase-energy/blob/master/directory_traversal_1.png • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •