These Sinapsi devices
store hard-coded passwords in the PHP file of the device. By using the
hard-coded passwords in the device, attackers can log into the device
with administrative privileges. This could allow the attacker to have
unauthorized access.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Jul 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64. | These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access. |
Title | Sinapsi eSolar Hard-Coded Password | |
Weaknesses | CWE-259 | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published: 2012-11-23T11:00:00
Updated: 2025-07-08T15:29:24.539Z
Reserved: 2012-11-14T00:00:00
Link: CVE-2012-5862

No data.

Status : Deferred
Published: 2012-11-23T12:09:58.430
Modified: 2025-07-08T16:15:26.580
Link: CVE-2012-5862

No data.