PatchSiren cyber security CVE debrief
CVE-2024-50698 Sungrow CVE debrief
CVE-2024-50698 affects Sungrow iSolarCloud Android App and WiNet Firmware. CISA describes a heap-based buffer overflow in MQTT message content bounds checks that may allow an attacker to remotely execute arbitrary code. Sungrow reports fixed firmware is available and the iSolarCloud Android App has been repaired.
- Vendor
- Sungrow
- Product
- iSolarCloud Android App
- CVSS
- HIGH 8.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-03-13
- Original CVE updated
- 2025-03-13
- Advisory published
- 2025-03-13
- Advisory updated
- 2025-03-13
Who should care
Organizations and individuals operating Sungrow iSolarCloud Android App versions <=2.1.6 or Sungrow WiNet Firmware in affected deployments should review this advisory. This is especially important for asset owners and administrators responsible for connected solar or industrial monitoring environments.
Technical summary
The advisory states that the affected products are vulnerable to a heap-based buffer overflow caused by insufficient bounds checks on MQTT message content. The impacted products are Sungrow iSolarCloud Android App <=2.1.6 and Sungrow WiNet Firmware (all versions). The stated impact is potential remote code execution.
Defensive priority
High. Prioritize remediation for all affected Sungrow iSolarCloud Android App and WiNet Firmware deployments, using vendor-provided updates as soon as practical.
Recommended defensive actions
- Update Sungrow WiNet Firmware to WINET-SV200.001.00.P028 or higher.
- Update the iSolarCloud Android App to the latest version via the device app store.
- Verify which Sungrow devices and app installations are in scope for the affected versions.
- Follow Sungrow's security notice for product-specific guidance and any additional mitigation steps.
- If immediate patching is not possible, increase monitoring of affected systems and limit exposure according to your ICS security practices.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-072-12 and its embedded product/remediation data. The advisory identifies the affected products, the vulnerability type, the potential remote code execution impact, and the fixed firmware version. CVE and advisory timing are taken from the supplied publishedAt/modifiedAt fields, both set to 2025-03-13T06:00:00.000Z. The source corpus does not list the CVE in KEV.
Official resources
-
CVE-2024-50698 CVE record
CVE.org
-
CVE-2024-50698 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in advisory ICSA-25-072-12 on 2025-03-13, which matches the supplied CVE published and modified timestamps.