The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack.
References
History

Mon, 15 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Growatt
Growatt shinelan-x
Vendors & Products Growatt
Growatt shinelan-x

Sat, 13 Dec 2025 08:30:00 +0000

Type Values Removed Values Added
Description The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack.
Title Authentication bypass on web interface
Weaknesses CWE-290
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: DIVD

Published: 2025-12-13T08:16:24.266Z

Updated: 2025-12-16T11:02:11.379Z

Reserved: 2025-04-15T21:54:36.815Z

Link: CVE-2025-36754

cve-icon Vulnrichment

Updated: 2025-12-15T20:27:49.031Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-13T16:16:54.570

Modified: 2025-12-15T18:22:13.783

Link: CVE-2025-36754

cve-icon Redhat

No data.