First published: Sat Aug 10 2024(Updated: )
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x
Credit: csirt@divd.nl
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Enphase IQ Gateway Firmware | >=4.0<=7.3.120 | |
Enphase IQ Gateway Firmware |
Devices are remotely being updated by the vendor.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21880 has a high severity rating due to its potential for OS command injection.
To mitigate CVE-2024-21880, ensure that your Enphase IQ Gateway firmware is updated to a version that is above 7.3.120.
CVE-2024-21880 affects Enphase IQ Gateway devices running firmware versions from 4.0 to 7.3.120.
Yes, CVE-2024-21880 can be exploited remotely through the url parameter of an authenticated endpoint.
CVE-2024-21880 is classified as a command injection vulnerability, allowing attackers to execute arbitrary commands on the system.