CVE-2024-50694
Published: 24 January 2025
Description
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when copying the timestamp read from an MQTT message, the underlying code does not check the bounds of the buffer that is used to store the message. This may lead to a stack-based buffer overflow.
Security Summary
CVE-2024-50694 is a stack-based buffer overflow vulnerability (CWE-121) affecting SunGrow WiNet-SV200 software in versions 001.00.P027 and earlier. The issue arises when the software copies a timestamp extracted from an MQTT message into a fixed-size buffer without performing bounds checks, potentially allowing arbitrary data to overflow the stack.
Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By sending a specially crafted MQTT message containing an oversized timestamp, an attacker could overwrite stack memory, potentially leading to remote code execution, denial of service, or unauthorized access to confidential data and system integrity.
SunGrow has published a security notice detailing the vulnerability at https://en.sungrowpower.com/security-notice-detail-2/5961, which serves as the primary reference for affected users seeking mitigation guidance or patches.
Details
- CWE(s)