to the system. By accessing certain pages with administrative privileges
that do not require authentication within the device, attackers can
execute arbitrary, unexpected, or dangerous commands directly onto the
operating system.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Sinapsi has developed a new firmware version 2.0.2870_2.2.12 that mitigates these vulnerabilities. Sinapsi released the new firmware on Monday, November 19, 2012 directly to the devices. Users will be able to manually download the firmware on their device by using the Firmware Update function in the System Menu in the device’s Web interface. Sinapsi has also posted a security newsletter to its public Web site http://www.sinapsitech.it/default.asp .Other affected vendors have been notified by Sinapsi and ICS-CERT, but the availability of new firmware upgrades are unknown by ICS-CERT at this time.
Workaround
No workaround given by the vendor.
Tue, 08 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ping.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in the ip_dominio parameter. | These Sinapsi devices do not check for special elements in commands sent to the system. By accessing certain pages with administrative privileges that do not require authentication within the device, attackers can execute arbitrary, unexpected, or dangerous commands directly onto the operating system. |
| Title | Sinapsi eSolar OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-07-08T15:25:08.554Z
Reserved: 2012-11-14T00:00:00
Link: CVE-2012-5863
No data.
Status : Deferred
Published: 2012-11-23T12:09:58.477
Modified: 2025-07-08T16:15:26.747
Link: CVE-2012-5863
No data.
OpenCVE Enrichment
No data.