CVE-2025-26857
15.04.2025, 22:15
Unauthenticated attackers can rename arbitrary devices of arbitrary users (i.e., EV chargers).Enginsight
| Vendor | Product | Version |
|---|---|---|
| growatt | cloud_portal | 𝑥 ≤ 3.6.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration