Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enphase envoy vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv3
CVE-2019-7676
A weak password vulnerability exists in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.
Enphase Envoy
9.8
CVSSv3
CVE-2019-7678
A directory traversal vulnerability exists in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css on TCP port 8888.
Enphase Envoy
6.1
CVSSv3
CVE-2019-7677
XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.
Enphase Envoy
8.8
CVSSv3
CVE-2020-25755
An issue exists on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.
Enphase Envoy Firmware R3.0
Enphase Envoy Firmware D4.0
9.8
CVSSv3
CVE-2020-25753
An issue exists on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
7.5
CVSSv3
CVE-2020-25754
An issue exists on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retriev...
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
5.3
CVSSv3
CVE-2020-25752
An issue exists on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static s...
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
9.8
CVSSv3
CVE-2023-33869
Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an malicious user to execute root commands.
Enphase Envoy Firmware D7.0.88
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started