11 results (0.006 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225. • https://csirt.divd.nl/CVE-2024-21879 https://csirt.divd.nl/DIVD-2024-00011 https://enphase.com/cybersecurity/advisories/ensa-2024-4 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.2EPSS: 0%CPEs: 1EXPL: 0

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and < 8.2.4225. • https://csirt.divd.nl/CVE-2024-21877 https://csirt.divd.nl/DIVD-2024-00011 https://enphase.com/cybersecurity/advisories/ensa-2024-2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.2EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched. • https://csirt.divd.nl/CVE-2024-21878 https://csirt.divd.nl/DIVD-2024-00011 https://enphase.com/cybersecurity/advisories/ensa-2024-3 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-171-01 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 1

An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter. Se detectó un problema en los dispositivos Enphase Envoy versiones R3.x y D4.x (y otros actuales). La función upgrade_start en la ruta /installer/upgrade_start permite a usuarios autenticados remotos ejecutar comandos arbitrarios por medio del parámetro force • https://enphase.com/en-us/products-and-services/envoy-and-combiner https://medium.com/stage-2-security/can-solar-controllers-be-used-to-generate-fake-clean-energy-credits-4a7322e7661a https://stage2sec.com • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •