First published: Wed Jun 16 2021(Updated: )
An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enphase Envoy | =d4.0 | |
Enphase Envoy | =r3.0 | |
Enphase Envoy Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25755 is categorized with a high severity due to its potential for remote command execution.
To fix CVE-2020-25755, ensure that you update the Enphase Envoy firmware to the latest version provided by the vendor.
CVE-2020-25755 affects Enphase Envoy R3.x and D4.x firmware versions.
CVE-2020-25755 enables remote authenticated users to execute arbitrary commands on vulnerable devices.
Yes, CVE-2020-25755 specifically affects Enphase Envoy firmware versions R3.0 and D4.0.