Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://en.sungrowpower.com/security-notice-detail-2/5961 |
|
Thu, 29 May 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sungrowpower
Sungrowpower winet-s Sungrowpower winet-s Firmware |
|
| CPEs | cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:* cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sungrowpower
Sungrowpower winet-s Sungrowpower winet-s Firmware |
Mon, 27 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-120 | |
| Metrics |
cvssV3_1
|
Fri, 24 Jan 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-27T15:37:57.414Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-50697
Updated: 2025-01-27T15:37:25.281Z
Status : Analyzed
Published: 2025-01-24T23:15:09.253
Modified: 2025-05-29T16:02:02.670
Link: CVE-2024-50697
No data.
OpenCVE Enrichment
No data.