CVE-2025-36747: CWE-798 Use of Hard-coded Credentials in Growatt ShineLan-X
ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced.
AI Analysis
Technical Summary
CVE-2025-36747 identifies a critical security vulnerability in the Growatt ShineLan-X device firmware version 3.6.0.0, categorized under CWE-798 for the use of hard-coded credentials. The firmware contains embedded FTP server credentials that allow unauthorized parties to establish an insecure FTP connection to the device. This vulnerability arises because the firmware does not enforce signature verification, meaning attackers can replace legitimate firmware or configuration files with malicious versions without detection. The attack vector is remote and does not require prior authentication or user interaction, significantly lowering the barrier for exploitation. The CVSS 4.0 score of 9.4 reflects the high impact on confidentiality, integrity, and availability, with a low attack complexity and no privileges required. The flaw enables attackers to potentially take full control of the device, disrupt solar energy management operations, or use the compromised device as a foothold for lateral movement within a network. No known exploits are currently reported in the wild, but the vulnerability's nature and criticality make it a prime target for threat actors. The lack of a patch at the time of disclosure necessitates immediate compensating controls to mitigate risk.
Potential Impact
For European organizations, especially those involved in renewable energy production and management, this vulnerability poses a significant threat. Compromise of ShineLan-X devices could lead to unauthorized manipulation of solar energy systems, resulting in operational disruptions, data breaches, or sabotage of energy infrastructure. This could affect energy availability and reliability, potentially causing financial losses and undermining trust in critical infrastructure. The ability to replace firmware without detection also raises concerns about persistent backdoors or malware implants that could facilitate long-term espionage or sabotage. Given the increasing reliance on smart energy management systems across Europe, the vulnerability could have cascading effects on energy grids and associated services. Organizations may face regulatory and compliance repercussions if such vulnerabilities lead to data breaches or service outages.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls such as isolating ShineLan-X devices within segmented VLANs or air-gapped networks to limit exposure. Organizations should monitor network traffic for unauthorized FTP connections and unusual file transfer activities. Since no official patch is available, applying strict access control lists (ACLs) to restrict FTP access to trusted management hosts is critical. Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for FTP anomalies can aid in early detection. Vendors should be engaged to prioritize firmware updates that remove hard-coded credentials and implement robust firmware signature verification. Additionally, organizations should conduct thorough audits of deployed devices to inventory affected versions and plan for phased replacement or upgrade. Implementing multi-factor authentication and secure management protocols where possible can further reduce risk.
Affected Countries
Germany, Spain, Italy, France, Netherlands
CVE-2025-36747: CWE-798 Use of Hard-coded Credentials in Growatt ShineLan-X
Description
ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced.
AI-Powered Analysis
Technical Analysis
CVE-2025-36747 identifies a critical security vulnerability in the Growatt ShineLan-X device firmware version 3.6.0.0, categorized under CWE-798 for the use of hard-coded credentials. The firmware contains embedded FTP server credentials that allow unauthorized parties to establish an insecure FTP connection to the device. This vulnerability arises because the firmware does not enforce signature verification, meaning attackers can replace legitimate firmware or configuration files with malicious versions without detection. The attack vector is remote and does not require prior authentication or user interaction, significantly lowering the barrier for exploitation. The CVSS 4.0 score of 9.4 reflects the high impact on confidentiality, integrity, and availability, with a low attack complexity and no privileges required. The flaw enables attackers to potentially take full control of the device, disrupt solar energy management operations, or use the compromised device as a foothold for lateral movement within a network. No known exploits are currently reported in the wild, but the vulnerability's nature and criticality make it a prime target for threat actors. The lack of a patch at the time of disclosure necessitates immediate compensating controls to mitigate risk.
Potential Impact
For European organizations, especially those involved in renewable energy production and management, this vulnerability poses a significant threat. Compromise of ShineLan-X devices could lead to unauthorized manipulation of solar energy systems, resulting in operational disruptions, data breaches, or sabotage of energy infrastructure. This could affect energy availability and reliability, potentially causing financial losses and undermining trust in critical infrastructure. The ability to replace firmware without detection also raises concerns about persistent backdoors or malware implants that could facilitate long-term espionage or sabotage. Given the increasing reliance on smart energy management systems across Europe, the vulnerability could have cascading effects on energy grids and associated services. Organizations may face regulatory and compliance repercussions if such vulnerabilities lead to data breaches or service outages.
Mitigation Recommendations
Immediate mitigation should focus on network-level controls such as isolating ShineLan-X devices within segmented VLANs or air-gapped networks to limit exposure. Organizations should monitor network traffic for unauthorized FTP connections and unusual file transfer activities. Since no official patch is available, applying strict access control lists (ACLs) to restrict FTP access to trusted management hosts is critical. Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for FTP anomalies can aid in early detection. Vendors should be engaged to prioritize firmware updates that remove hard-coded credentials and implement robust firmware signature verification. Additionally, organizations should conduct thorough audits of deployed devices to inventory affected versions and plan for phased replacement or upgrade. Implementing multi-factor authentication and secure management protocols where possible can further reduce risk.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DIVD
- Date Reserved
- 2025-04-15T21:54:36.813Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693d2747f35c2264d84722ea
Added to database: 12/13/2025, 8:43:51 AM
Last enriched: 12/20/2025, 9:02:39 AM
Last updated: 2/6/2026, 6:32:46 AM
Views: 160
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-8149: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri Portal for ArcGIS
MediumCVE-2024-51962: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Esri ArcGIS Server
HighCVE-2024-51954: CWE-284: Improper Access Control in Esri ArcGIS Server
HighCVE-2024-25699: CWE-287 Improper Authentication in Esri Portal for ArcGIS
HighCVE-2026-1998: Memory Corruption in micropython
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.