VDE-2025-012
Vulnerability from csaf_smasolartechnologyag - Published: 2025-02-26 11:00 - Updated: 2025-05-22 13:03Summary
SMA: Sunny Portal Remote Code Execution
Notes
LICENSE: [CERT@VDE CSAF Template](https://github.com/CERTVDE/CSAF-Template) © 2024 by [CERT@VDE](https://certvde.com) is licensed under [CC BY-NC 4.0](https://creativecommons.org/licenses/by-nc/4.0/?ref=chooser-v1)
This document note may only be removed in order to create a CSAF advisory based on this template.
Summary: A security researcher discovered a critical Remote Code Execution vulnerability in sunnyportal.com.
An attacker could upload code instead of an image and remotely execute this code.
Impact: An unauthenticated attacker could upload code instead of an image in the demo section of the portal and can remotely execute this code.
Remediation: No action required. The vulnerability was closed in the portal on December, 19, 2024.
Product Description: Sunny Portal is an online portal for SMA customers to monitor their PV Systems
An unauthenticated remote attacker can upload a '.aspx' file instead of a PV system picture through the demo account. The code can only be executed in the security context of the user.
6.5 (Medium)
Affected products
Fixed
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Software www.sunnyportal.com 19.12.2024
SMA Solar Technology AG / Software / www.sunnyportal.com
|
19.12.2024 |
Vendor Fix
|
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
www.sunnyportal.com <19.12.2024
SMA Solar Technology AG / Software / www.sunnyportal.com
|
<19.12.2024 |
References
4 references
Acknowledgments
CERT@VDE
certvde.com
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Francesco La Spina"
],
"organization": "Forescout Technologies Inc. ",
"summary": "reporting",
"urls": [
"https://www.forescout.com"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"audience": "csaf creator",
"category": "other",
"text": "[CERT@VDE CSAF Template](https://github.com/CERTVDE/CSAF-Template) \u00a9 2024 by [CERT@VDE](https://certvde.com) is licensed under [CC BY-NC 4.0](https://creativecommons.org/licenses/by-nc/4.0/?ref=chooser-v1) \n\nThis document note may only be removed in order to create a CSAF advisory based on this template.",
"title": "LICENSE"
},
{
"category": "summary",
"text": "A security researcher discovered a critical Remote Code Execution vulnerability in sunnyportal.com.\nAn attacker could upload code instead of an image and remotely execute this code.",
"title": "Summary"
},
{
"category": "description",
"text": "An unauthenticated attacker could upload code instead of an image in the demo section of the portal and can remotely execute this code.",
"title": "Impact"
},
{
"category": "description",
"text": "No action required. The vulnerability was closed in the portal on December, 19, 2024.",
"title": "Remediation"
},
{
"category": "description",
"text": "Sunny Portal is an online portal for SMA customers to monitor their PV Systems",
"title": "Product Description"
}
],
"publisher": {
"category": "vendor",
"contact_details": "information-security@sma.de",
"name": "SMA Solar Technology AG",
"namespace": "https://sma.de"
},
"references": [
{
"category": "external",
"summary": "SMA PSIRT",
"url": "https://www.sma.de/en/cybersecurity/product-security"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for SMA",
"url": "https://certvde.com/en/advisories/vendor/sma/"
},
{
"category": "self",
"summary": "VDE-2025-012: SMA: Sunny Portal Remote Code Execution - HTML",
"url": "https://certvde.com/en/advisories/VDE-2025-012"
},
{
"category": "self",
"summary": "VDE-2025-012: SMA: Sunny Portal Remote Code Execution - CSAF",
"url": "https://sma.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-012.json"
}
],
"title": "SMA: Sunny Portal Remote Code Execution",
"tracking": {
"aliases": [
"VDE-2025-012"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2025-02-28T13:40:20.075Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.18"
}
},
"id": "VDE-2025-012",
"initial_release_date": "2025-02-26T11:00:00.000Z",
"revision_history": [
{
"date": "2025-02-26T11:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2025-02-28T14:00:00.000Z",
"number": "2",
"summary": "Update: Changed Date in Remediation"
},
{
"date": "2025-04-10T13:00:00.000Z",
"number": "3",
"summary": "fixed document status, csaf reference URL"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "4",
"summary": "Fix: added distribution, quotation mark"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.12.2024",
"product": {
"name": "www.sunnyportal.com \u003c19.12.2024",
"product_id": "CSAFPID-51001"
}
},
{
"category": "product_version",
"name": "19.12.2024",
"product": {
"name": "Software www.sunnyportal.com 19.12.2024",
"product_id": "CSAFPID-52001"
}
}
],
"category": "product_name",
"name": "www.sunnyportal.com"
}
],
"category": "product_family",
"name": "Software"
}
],
"category": "vendor",
"name": "SMA Solar Technology AG"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-0731",
"cwe": {
"id": "CWE-434",
"name": "Unrestricted Upload of File with Dangerous Type"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "An unauthenticated remote attacker can upload a \u0027.aspx\u0027 file instead of a PV system picture through the demo account. The code can only be executed in the security context of the user.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-52001"
],
"known_affected": [
"CSAFPID-51001"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-19T11:00:00.000Z",
"details": "SMA has fixed the vulnerability on the web service. No customer action required.",
"product_ids": [
"CSAFPID-52001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-51001"
]
}
],
"title": "CVE-2025-0731"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…