Cyber Posture

CVE-2024-50697

High

Published: 24 January 2025

Published
24 January 2025
Modified
29 May 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0048 65.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-50697 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Sungrowpower Winet-S Firmware. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 34.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires bounds checking and validation of MQTT TLV fields during parsing to directly prevent stack-based buffer overflows from malformed inputs.

prevent

Mandates timely remediation of identified flaws like this buffer overflow via firmware updates published by SunGrow.

prevent

Implements memory protections such as stack canaries or non-executable stacks to mitigate exploitation of the stack-based buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Stack-based buffer overflow in network-exposed MQTT message handling on device firmware directly enables remote exploitation for initial access and arbitrary code execution (T1190/T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow.

Deeper analysisAI

CVE-2024-50697 is a stack-based buffer overflow vulnerability in SunGrow WiNet-SV200 firmware versions 001.00.P027 and earlier. The issue arises during the decryption of MQTT messages, where the code parsing specific TLV fields lacks sufficient bounds checks, potentially allowing overflow of the stack buffer. This flaw is classified under CWE-120 (Buffer Copy without Checking Size of Input) and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility but high attack complexity.

Remote attackers with no privileges or user interaction required can exploit this vulnerability over the network by crafting malicious MQTT messages containing specially prepared TLV fields. Successful exploitation could lead to high-impact consequences, including arbitrary code execution, data confidentiality breaches, integrity violations, and denial of service, as the buffer overflow may allow control over the stack and potentially compromise the affected device.

SunGrow has published a security notice detailing the vulnerability at https://en.sungrowpower.com/security-notice-detail-2/5961, which security practitioners should consult for mitigation guidance, such as firmware updates or configuration changes.

Details

CWE(s)

Affected Products

sungrowpower
winet-s firmware
≤ 200.001.00.p027

CVEs Like This One

CVE-2024-50695Same product: Sungrowpower Winet-S
CVE-2024-50694Same product: Sungrowpower Winet-S
CVE-2024-50698Same product: Sungrowpower Winet-S
CVE-2024-50696Same product: Sungrowpower Winet-S
CVE-2024-50693Same vendor: Sungrowpower
CVE-2024-50685Same vendor: Sungrowpower
CVE-2024-50686Same vendor: Sungrowpower
CVE-2024-48416Shared CWE-120
CVE-2024-50689Same vendor: Sungrowpower
CVE-2024-50687Same vendor: Sungrowpower

References