Metrics
Affected Vendors & Products
Solution
Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions: * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.) * Use strong passwords and enable multi-factor authentication where applicable. * Report any security concerns to Service@Growatt.com. * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.
Workaround
No workaround given by the vendor.
Wed, 16 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Apr 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off). | |
Title | Growatt Cloud portal External Control of System or Configuration Setting | |
Weaknesses | CWE-15 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T14:41:18.922Z
Reserved: 2025-04-01T17:19:07.794Z
Link: CVE-2025-30512

Updated: 2025-04-16T14:23:12.224Z

Status : Awaiting Analysis
Published: 2025-04-15T22:15:26.403
Modified: 2025-04-16T13:25:37.340
Link: CVE-2025-30512

No data.

No data.