Vulnerability Description
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) allows OS Command Injection.This issue affects Envoy: 4.x <= 7.x
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enphase | Iq Gateway Firmware | >= 4.0, <= 7.3.120 |
| Enphase | Iq Gateway | - |
Related Weaknesses (CWE)
References
- https://csirt.divd.nl/CVE-2024-21880Third Party Advisory
- https://csirt.divd.nl/DIVD-2024-00011Third Party Advisory
- https://enphase.com/cybersecurity/advisories/ensa-2024-5Vendor Advisory
FAQ
What is CVE-2024-21880?
CVE-2024-21880 is a vulnerability with a CVSS score of 7.2 (HIGH). Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability via the url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Enphase) al...
How severe is CVE-2024-21880?
CVE-2024-21880 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21880?
Check the references section above for vendor advisories and patch information. Affected products include: Enphase Iq Gateway Firmware, Enphase Iq Gateway.