{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-36747","assignerOrgId":"b87402ff-ae37-4194-9dae-31abdbd6f217","state":"PUBLISHED","assignerShortName":"DIVD","dateReserved":"2025-04-15T21:54:36.813Z","datePublished":"2025-12-13T08:16:25.804Z","dateUpdated":"2025-12-16T11:02:11.957Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ShineLan-X","vendor":"Growatt","versions":[{"lessThanOrEqual":"3.6.0.2","status":"affected","version":"3.6.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Hamid Rahmouni & Akram Hamdi"},{"lang":"en","type":"analyst","value":"Victor Pasman"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced."}],"value":"ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"PRESENT","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.4,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-798","description":"CWE-798 Use of Hard-coded Credentials","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b87402ff-ae37-4194-9dae-31abdbd6f217","shortName":"DIVD","dateUpdated":"2025-12-16T11:02:11.957Z"},"references":[{"tags":["third-party-advisory"],"url":"https://csirt.divd.nl/CVE-2025-36747/"}],"source":{"discovery":"EXTERNAL"},"title":"Hardcoded FTP Credentials within the firmware","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-15T20:30:04.724934Z","id":"CVE-2025-36747","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-15T20:33:08.241Z"}}]}}