First published: Wed Feb 26 2025(Updated: )
SunGrow iSolarCloud Android application V2.1.6.20241017 and prior contains hardcoded credentials. The application (regardless of the user account) and the cloud uses the same MQTT credentials for exchanging the device telemetry.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sungrow iSolarCloud | <2.1.6.20241104 | |
iSolarCloud | <2.1.6.20241017 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50688 is considered a critical vulnerability due to the presence of hardcoded credentials in the SunGrow iSolarCloud application.
To fix CVE-2024-50688, update the SunGrow iSolarCloud application to version 2.1.6.20241018 or later where the hardcoded credentials issue is resolved.
The risks include unauthorized access to device telemetry and control due to the shared hardcoded MQTT credentials.
Versions of the SunGrow iSolarCloud app prior to 2.1.6.20241018 are affected by CVE-2024-50688.
Yes, CVE-2024-50688 can be exploited remotely, allowing attackers to gain unauthorized access to the device telemetry.