CVE-2025-25276
15.04.2025, 22:15
An unauthenticated attacker can hijack other users' devices and potentially control them.Enginsight
| Vendor | Product | Version |
|---|---|---|
| growatt | cloud_portal | 𝑥 ≤ 3.6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
An unauthenticated attacker can hijack other users' devices and potentially control them.Enginsight
| Vendor | Product | Version |
|---|---|---|
| growatt | cloud_portal | 𝑥 ≤ 3.6.0 |