CVE-2025-27929
- EPSS 0.27%
- Veröffentlicht 15.04.2025 21:59:31
- Zuletzt bearbeitet 14.11.2025 18:12:43
Unauthenticated attackers can retrieve full list of users associated with arbitrary accounts.
CVE-2025-24315
- EPSS 0.52%
- Veröffentlicht 15.04.2025 21:57:28
- Zuletzt bearbeitet 14.11.2025 18:14:44
Unauthenticated attackers can add devices of other users to their scenes (or arbitrary scenes of other arbitrary users).
CVE-2025-27561
- EPSS 0.52%
- Veröffentlicht 15.04.2025 21:55:20
- Zuletzt bearbeitet 14.11.2025 18:13:18
Unauthenticated attackers can rename "rooms" of arbitrary users.
CVE-2025-30257
- EPSS 0.27%
- Veröffentlicht 15.04.2025 21:53:13
- Zuletzt bearbeitet 14.11.2025 18:12:40
Unauthenticated attackers can retrieve serial number of smart meters associated to a specific user account.
CVE-2025-31147
- EPSS 0.27%
- Veröffentlicht 15.04.2025 21:50:38
- Zuletzt bearbeitet 14.11.2025 18:12:15
Unauthenticated attackers can query information about total energy consumed by EV chargers of arbitrary users.
CVE-2025-31360
- EPSS 0.52%
- Veröffentlicht 15.04.2025 21:48:21
- Zuletzt bearbeitet 12.11.2025 16:11:47
Unauthenticated attackers can trigger device actions associated with specific "scenes" of arbitrary users.
CVE-2025-30512
- EPSS 0.64%
- Veröffentlicht 15.04.2025 21:45:46
- Zuletzt bearbeitet 14.11.2025 18:12:18
Unauthenticated attackers can send configuration settings to device and possible perform physical actions remotely (e.g., on/off).
CVE-2025-27927
- EPSS 0.27%
- Veröffentlicht 15.04.2025 21:43:15
- Zuletzt bearbeitet 14.11.2025 18:12:46
An unauthenticated attackers can obtain a list of smart devices by knowing a valid username through an unprotected API.
CVE-2025-24297
- EPSS 0.37%
- Veröffentlicht 15.04.2025 21:39:24
- Zuletzt bearbeitet 14.11.2025 18:14:47
Due to lack of server-side input validation, attackers can inject malicious JavaScript code into users personal spaces of the web portal.
CVE-2025-30510
- EPSS 0.11%
- Veröffentlicht 15.04.2025 21:36:07
- Zuletzt bearbeitet 14.11.2025 18:12:32
An attacker can upload an arbitrary file instead of a plant image.