These Sinapsi devices
store hard-coded passwords in the PHP file of the device. By using the
hard-coded passwords in the device, attackers can log into the device
with administrative privileges. This could allow the attacker to have
unauthorized access.
References
Configurations
Configuration 1 (hide)
AND |
|
History
08 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access. | |
References |
|
|
CWE | CWE-259 |
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-09/0045.html - Exploit | |
References | () http://www.exploit-db.com/exploits/21273/ - Exploit | |
References | () http://www.sinapsitech.it/default.asp?active_page_id=78&news_id=88 - | |
References | () http://www.us-cert.gov/control_systems/pdf/ICSA-12-325-01.pdf - US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/80200 - |
Information
Published : 2012-11-23 12:09
Updated : 2025-07-08 16:15
NVD link : CVE-2012-5862
Mitre link : CVE-2012-5862
CVE.ORG link : CVE-2012-5862
JSON object : View
Products Affected
sinapsitech
- esolar_light_photovoltaic_system_monitor
- sinapsi_firmware
- esolar_duo_photovoltaic_system_monitor
- esolar_photovoltaic_system_monitor