The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://csirt.divd.nl/CVE-2025-36754/ |
|
History
Mon, 15 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Growatt
Growatt shinelan-x |
|
| Vendors & Products |
Growatt
Growatt shinelan-x |
Sat, 13 Dec 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The authentication mechanism on web interface is not properly implemented. It is possible to bypass authentication checks by crafting a post request with new settings since there is no session token or authentication in place. This would allow an attacker for instance to point the device to an arbitrary address for domain name resolution to e.g. facililitate a man-in-the-middle (MitM) attack. | |
| Title | Authentication bypass on web interface | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: DIVD
Published: 2025-12-13T08:16:24.266Z
Updated: 2025-12-16T11:02:11.379Z
Reserved: 2025-04-15T21:54:36.815Z
Link: CVE-2025-36754
Updated: 2025-12-15T20:27:49.031Z
Status : Awaiting Analysis
Published: 2025-12-13T16:16:54.570
Modified: 2025-12-15T18:22:13.783
Link: CVE-2025-36754
No data.