The MOD3 command traffic between the monitoring...
High severity
Unreviewed
Published
Aug 8, 2025
to the GitHub Advisory Database
•
Updated Aug 8, 2025
Description
Published by the National Vulnerability Database
Aug 8, 2025
Published to the GitHub Advisory Database
Aug 8, 2025
Last updated
Aug 8, 2025
The MOD3 command traffic between the monitoring application and the
inverter is transmitted in plaintext without encryption or obfuscation.
This vulnerability may allow an attacker with access to a local network
to intercept, manipulate, replay, or forge critical data, including
read/write operations for voltage, current, and power configuration,
operational status, alarms, telemetry, system reset, or inverter control
commands, potentially disrupting power generation or reconfiguring
inverter settings.
References