CVE-2024-50697
Published: 24 January 2025
Description
In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow.
Security Summary
CVE-2024-50697 is a stack-based buffer overflow vulnerability in SunGrow WiNet-SV200 firmware versions 001.00.P027 and earlier. The issue arises during the decryption of MQTT messages, where the code parsing specific TLV fields lacks sufficient bounds checks, potentially allowing overflow of the stack buffer. This flaw is classified under CWE-120 (Buffer Copy without Checking Size of Input) and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility but high attack complexity.
Remote attackers with no privileges or user interaction required can exploit this vulnerability over the network by crafting malicious MQTT messages containing specially prepared TLV fields. Successful exploitation could lead to high-impact consequences, including arbitrary code execution, data confidentiality breaches, integrity violations, and denial of service, as the buffer overflow may allow control over the stack and potentially compromise the affected device.
SunGrow has published a security notice detailing the vulnerability at https://en.sungrowpower.com/security-notice-detail-2/5961, which security practitioners should consult for mitigation guidance, such as firmware updates or configuration changes.
Details
- CWE(s)