Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off).
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04 | Mitigation Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2025-04-15 22:15
Updated : 2025-11-14 18:12
NVD link : CVE-2025-30512
Mitre link : CVE-2025-30512
CVE.ORG link : CVE-2025-30512
JSON object : View
Products Affected
growatt
- cloud_portal
CWE
CWE-15
External Control of System or Configuration Setting
