Vulnerabilities
Vulnerable Software
Enphase:  Security Vulnerabilities
An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords.
CVSS Score
5.3
EPSS Score
0.008
Published
2021-06-16
A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.
CVSS Score
7.2
EPSS Score
0.004
Published
2019-02-09
XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.
CVSS Score
6.1
EPSS Score
0.003
Published
2019-02-09
A directory traversal vulnerability was discovered in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css on TCP port 8888.
CVSS Score
9.8
EPSS Score
0.006
Published
2019-02-09


Contact Us

Shodan ® - All rights reserved