{"uuid": "366709ab-fde1-481b-955c-e8c297d80b92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50688", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6434", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50688\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: SunGrow iSolarCloud Android application V2.1.6.20241017 and prior contains hardcoded credentials. The application (regardless of the user account) and the cloud uses the same MQTT credentials for exchanging the device telemetry.\n\ud83d\udccf Published: 2025-02-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-04T21:19:16.753Z\n\ud83d\udd17 References:\n1. https://en.sungrowpower.com/security-notice-detail-2/6122", "creation_timestamp": "2025-03-04T21:35:41.000000Z"}