CVE-2025-36752: CWE-798 Use of Hard-coded Credentials in Growatt ShineLan-X
Growatt ShineLan-X communication dongle has an undocumented backup account with undocumented credentials which allows significant level access to the device, such as allowing any attacker to access the Setting Center. This means that this is effectively backdoor for all devices utilizing a Growatt ShineLan-X communication dongle.
AI Analysis
Technical Summary
The CVE-2025-36752 vulnerability concerns the Growatt ShineLan-X communication dongle, a device used primarily in solar energy systems to facilitate communication and monitoring. The vulnerability arises from the presence of an undocumented backup account embedded within the device firmware, which uses hard-coded credentials (CWE-798). These credentials are not publicly documented, effectively serving as a backdoor that grants attackers significant access privileges, including the ability to access the Setting Center of the device. This level of access allows an attacker to alter device configurations, potentially disrupt operations, or pivot to other parts of the network. The vulnerability affects version 3.6.0.0 of the ShineLan-X dongle. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with an attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high, and the scope is high, meaning exploitation can affect components beyond the vulnerable device itself. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was reserved in April 2025 and published in December 2025. Given the role of ShineLan-X dongles in solar energy infrastructure, exploitation could have serious operational and security consequences.
Potential Impact
For European organizations, particularly those involved in renewable energy and solar power installations, this vulnerability poses a significant threat. Unauthorized access to the ShineLan-X dongle could allow attackers to manipulate device settings, disrupt energy monitoring and management, and potentially cause operational downtime or damage. This could lead to financial losses, regulatory non-compliance, and reputational damage. Furthermore, since these devices often form part of critical infrastructure, exploitation could have cascading effects on energy distribution and grid stability. The high severity and ease of exploitation without authentication or user interaction increase the risk of widespread compromise. Additionally, attackers could leverage this backdoor to move laterally within networks, targeting other connected systems. The lack of available patches means organizations must rely on compensating controls to mitigate risk in the short term.
Mitigation Recommendations
1. Immediately segment networks to isolate ShineLan-X dongles from critical systems and limit access to trusted management networks only. 2. Implement strict network access controls and monitoring to detect unusual traffic patterns or unauthorized access attempts targeting the dongles. 3. Engage with Growatt to obtain information on planned patches or firmware updates and apply them promptly once available. 4. Conduct thorough inventory and asset management to identify all ShineLan-X devices in use and verify their firmware versions. 5. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect exploitation attempts related to this vulnerability. 6. Consider deploying compensating controls such as VPNs or encrypted tunnels for device communication to reduce exposure. 7. Train operational technology (OT) and IT security teams on the risks associated with hard-coded credentials and backdoors. 8. Develop incident response plans specific to potential exploitation scenarios involving these devices. 9. Where possible, replace vulnerable devices with alternatives that do not contain hard-coded credentials. 10. Regularly review and update security policies governing IoT and OT device management.
Affected Countries
Germany, Spain, Italy, Netherlands, France, United Kingdom
CVE-2025-36752: CWE-798 Use of Hard-coded Credentials in Growatt ShineLan-X
Description
Growatt ShineLan-X communication dongle has an undocumented backup account with undocumented credentials which allows significant level access to the device, such as allowing any attacker to access the Setting Center. This means that this is effectively backdoor for all devices utilizing a Growatt ShineLan-X communication dongle.
AI-Powered Analysis
Technical Analysis
The CVE-2025-36752 vulnerability concerns the Growatt ShineLan-X communication dongle, a device used primarily in solar energy systems to facilitate communication and monitoring. The vulnerability arises from the presence of an undocumented backup account embedded within the device firmware, which uses hard-coded credentials (CWE-798). These credentials are not publicly documented, effectively serving as a backdoor that grants attackers significant access privileges, including the ability to access the Setting Center of the device. This level of access allows an attacker to alter device configurations, potentially disrupt operations, or pivot to other parts of the network. The vulnerability affects version 3.6.0.0 of the ShineLan-X dongle. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with an attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high, and the scope is high, meaning exploitation can affect components beyond the vulnerable device itself. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was reserved in April 2025 and published in December 2025. Given the role of ShineLan-X dongles in solar energy infrastructure, exploitation could have serious operational and security consequences.
Potential Impact
For European organizations, particularly those involved in renewable energy and solar power installations, this vulnerability poses a significant threat. Unauthorized access to the ShineLan-X dongle could allow attackers to manipulate device settings, disrupt energy monitoring and management, and potentially cause operational downtime or damage. This could lead to financial losses, regulatory non-compliance, and reputational damage. Furthermore, since these devices often form part of critical infrastructure, exploitation could have cascading effects on energy distribution and grid stability. The high severity and ease of exploitation without authentication or user interaction increase the risk of widespread compromise. Additionally, attackers could leverage this backdoor to move laterally within networks, targeting other connected systems. The lack of available patches means organizations must rely on compensating controls to mitigate risk in the short term.
Mitigation Recommendations
1. Immediately segment networks to isolate ShineLan-X dongles from critical systems and limit access to trusted management networks only. 2. Implement strict network access controls and monitoring to detect unusual traffic patterns or unauthorized access attempts targeting the dongles. 3. Engage with Growatt to obtain information on planned patches or firmware updates and apply them promptly once available. 4. Conduct thorough inventory and asset management to identify all ShineLan-X devices in use and verify their firmware versions. 5. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect exploitation attempts related to this vulnerability. 6. Consider deploying compensating controls such as VPNs or encrypted tunnels for device communication to reduce exposure. 7. Train operational technology (OT) and IT security teams on the risks associated with hard-coded credentials and backdoors. 8. Develop incident response plans specific to potential exploitation scenarios involving these devices. 9. Where possible, replace vulnerable devices with alternatives that do not contain hard-coded credentials. 10. Regularly review and update security policies governing IoT and OT device management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DIVD
- Date Reserved
- 2025-04-15T21:54:36.815Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693d2747f35c2264d84722f6
Added to database: 12/13/2025, 8:43:51 AM
Last enriched: 12/13/2025, 8:49:24 AM
Last updated: 12/14/2025, 9:05:53 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14648: Command Injection in DedeBIZ
MediumCVE-2025-14647: SQL Injection in code-projects Computer Book Store
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.