Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36752: CWE-798 Use of Hard-coded Credentials in Growatt ShineLan-X

0
Critical
VulnerabilityCVE-2025-36752cvecve-2025-36752cwe-798
Published: Sat Dec 13 2025 (12/13/2025, 08:16:25 UTC)
Source: CVE Database V5
Vendor/Project: Growatt
Product: ShineLan-X

Description

Growatt ShineLan-X communication dongle has an undocumented backup account with undocumented credentials which allows significant level access to the device, such as allowing any attacker to access the Setting Center. This means that this is effectively backdoor for all devices utilizing a Growatt ShineLan-X communication dongle.

AI-Powered Analysis

AILast updated: 12/13/2025, 08:49:24 UTC

Technical Analysis

The CVE-2025-36752 vulnerability concerns the Growatt ShineLan-X communication dongle, a device used primarily in solar energy systems to facilitate communication and monitoring. The vulnerability arises from the presence of an undocumented backup account embedded within the device firmware, which uses hard-coded credentials (CWE-798). These credentials are not publicly documented, effectively serving as a backdoor that grants attackers significant access privileges, including the ability to access the Setting Center of the device. This level of access allows an attacker to alter device configurations, potentially disrupt operations, or pivot to other parts of the network. The vulnerability affects version 3.6.0.0 of the ShineLan-X dongle. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with an attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high, and the scope is high, meaning exploitation can affect components beyond the vulnerable device itself. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was reserved in April 2025 and published in December 2025. Given the role of ShineLan-X dongles in solar energy infrastructure, exploitation could have serious operational and security consequences.

Potential Impact

For European organizations, particularly those involved in renewable energy and solar power installations, this vulnerability poses a significant threat. Unauthorized access to the ShineLan-X dongle could allow attackers to manipulate device settings, disrupt energy monitoring and management, and potentially cause operational downtime or damage. This could lead to financial losses, regulatory non-compliance, and reputational damage. Furthermore, since these devices often form part of critical infrastructure, exploitation could have cascading effects on energy distribution and grid stability. The high severity and ease of exploitation without authentication or user interaction increase the risk of widespread compromise. Additionally, attackers could leverage this backdoor to move laterally within networks, targeting other connected systems. The lack of available patches means organizations must rely on compensating controls to mitigate risk in the short term.

Mitigation Recommendations

1. Immediately segment networks to isolate ShineLan-X dongles from critical systems and limit access to trusted management networks only. 2. Implement strict network access controls and monitoring to detect unusual traffic patterns or unauthorized access attempts targeting the dongles. 3. Engage with Growatt to obtain information on planned patches or firmware updates and apply them promptly once available. 4. Conduct thorough inventory and asset management to identify all ShineLan-X devices in use and verify their firmware versions. 5. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect exploitation attempts related to this vulnerability. 6. Consider deploying compensating controls such as VPNs or encrypted tunnels for device communication to reduce exposure. 7. Train operational technology (OT) and IT security teams on the risks associated with hard-coded credentials and backdoors. 8. Develop incident response plans specific to potential exploitation scenarios involving these devices. 9. Where possible, replace vulnerable devices with alternatives that do not contain hard-coded credentials. 10. Regularly review and update security policies governing IoT and OT device management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
DIVD
Date Reserved
2025-04-15T21:54:36.815Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d2747f35c2264d84722f6

Added to database: 12/13/2025, 8:43:51 AM

Last enriched: 12/13/2025, 8:49:24 AM

Last updated: 12/14/2025, 9:05:53 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats