In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://en.sungrowpower.com/security-notice-detail-2/5961 |
![]() ![]() |
History
Wed, 05 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-121 | |
Metrics |
cvssV3_1
|
Fri, 24 Jan 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-24T00:00:00.000Z
Updated: 2025-02-05T14:32:28.508Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-50694

Updated: 2025-01-27T16:57:50.161Z

Status : Awaiting Analysis
Published: 2025-01-24T23:15:09.000
Modified: 2025-02-05T15:15:20.463
Link: CVE-2024-50694

No data.