Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
enphase envoy firmware d4.0 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2020-25752
An issue exists on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static s...
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
445
VMScore
CVE-2020-25754
An issue exists on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retriev...
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
668
VMScore
CVE-2020-25753
An issue exists on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
578
VMScore
CVE-2020-25755
An issue exists on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.
Enphase Envoy Firmware D4.0
Enphase Envoy Firmware R3.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started