Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x
Metrics
Affected Vendors & Products
References
History
Fri, 23 Aug 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Enphase iq Gateway
Enphase iq Gateway Firmware |
|
Weaknesses | CWE-78 | |
CPEs | cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:* cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Enphase iq Gateway
Enphase iq Gateway Firmware |
|
Metrics |
cvssV3_1
|
Tue, 13 Aug 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Enphase
Enphase envoy |
|
CPEs | cpe:2.3:h:enphase:envoy:*:*:*:*:*:*:*:* | |
Vendors & Products |
Enphase
Enphase envoy |
|
Metrics |
ssvc
|
Sat, 10 Aug 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x | |
Title | URL parameter manipulations allows an authenticated attacker to execute arbitrary OS commands in Enphase IQ Gateway version 4.x <= 7.x | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: DIVD
Published:
Updated: 2024-08-13T15:49:26.290Z
Reserved: 2024-01-02T18:30:11.175Z
Link: CVE-2024-21880

Updated: 2024-08-13T15:49:22.302Z

Status : Analyzed
Published: 2024-08-12T13:38:15.357
Modified: 2024-08-23T17:38:35.193
Link: CVE-2024-21880

No data.