Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g8qx-jhjm-3f9h

Опубликовано: 08 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.5
CVSS3: 6.9

Описание

The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or forge critical data, including read/write operations for voltage, current, and power configuration, operational status, alarms, telemetry, system reset, or inverter control commands, potentially disrupting power generation or reconfiguring inverter settings.

The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or forge critical data, including read/write operations for voltage, current, and power configuration, operational status, alarms, telemetry, system reset, or inverter control commands, potentially disrupting power generation or reconfiguring inverter settings.

EPSS

Процентиль: 0%
0.00005
Низкий

7.5 High

CVSS4

6.9 Medium

CVSS3

Дефекты

CWE-319

Связанные уязвимости

CVSS3: 6.9
nvd
6 месяцев назад

The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or forge critical data, including read/write operations for voltage, current, and power configuration, operational status, alarms, telemetry, system reset, or inverter control commands, potentially disrupting power generation or reconfiguring inverter settings.

EPSS

Процентиль: 0%
0.00005
Низкий

7.5 High

CVSS4

6.9 Medium

CVSS3

Дефекты

CWE-319