PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-50698 Sungrow CVE debrief

CVE-2024-50698 affects Sungrow iSolarCloud Android App and WiNet Firmware. CISA describes a heap-based buffer overflow in MQTT message content bounds checks that may allow an attacker to remotely execute arbitrary code. Sungrow reports fixed firmware is available and the iSolarCloud Android App has been repaired.

Vendor
Sungrow
Product
iSolarCloud Android App
CVSS
HIGH 8.1
CISA KEV
Not listed in stored evidence
Original CVE published
2025-03-13
Original CVE updated
2025-03-13
Advisory published
2025-03-13
Advisory updated
2025-03-13

Who should care

Organizations and individuals operating Sungrow iSolarCloud Android App versions <=2.1.6 or Sungrow WiNet Firmware in affected deployments should review this advisory. This is especially important for asset owners and administrators responsible for connected solar or industrial monitoring environments.

Technical summary

The advisory states that the affected products are vulnerable to a heap-based buffer overflow caused by insufficient bounds checks on MQTT message content. The impacted products are Sungrow iSolarCloud Android App <=2.1.6 and Sungrow WiNet Firmware (all versions). The stated impact is potential remote code execution.

Defensive priority

High. Prioritize remediation for all affected Sungrow iSolarCloud Android App and WiNet Firmware deployments, using vendor-provided updates as soon as practical.

Recommended defensive actions

  • Update Sungrow WiNet Firmware to WINET-SV200.001.00.P028 or higher.
  • Update the iSolarCloud Android App to the latest version via the device app store.
  • Verify which Sungrow devices and app installations are in scope for the affected versions.
  • Follow Sungrow's security notice for product-specific guidance and any additional mitigation steps.
  • If immediate patching is not possible, increase monitoring of affected systems and limit exposure according to your ICS security practices.

Evidence notes

Primary evidence comes from the CISA CSAF advisory ICSA-25-072-12 and its embedded product/remediation data. The advisory identifies the affected products, the vulnerability type, the potential remote code execution impact, and the fixed firmware version. CVE and advisory timing are taken from the supplied publishedAt/modifiedAt fields, both set to 2025-03-13T06:00:00.000Z. The source corpus does not list the CVE in KEV.

Official resources

Publicly disclosed by CISA in advisory ICSA-25-072-12 on 2025-03-13, which matches the supplied CVE published and modified timestamps.