In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow.
References
Link | Resource |
---|---|
https://en.sungrowpower.com/security-notice-detail-2/5961 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
29 May 2025, 16:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://en.sungrowpower.com/security-notice-detail-2/5961 - Vendor Advisory | |
CPE | cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:* |
|
First Time |
Sungrowpower
Sungrowpower winet-s Sungrowpower winet-s Firmware |
05 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
|
CWE | CWE-121 |
24 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-24 23:15
Updated : 2025-05-29 16:02
NVD link : CVE-2024-50694
Mitre link : CVE-2024-50694
CVE.ORG link : CVE-2024-50694
JSON object : View
Products Affected
sungrowpower
- winet-s
- winet-s_firmware
CWE
CWE-121
Stack-based Buffer Overflow