We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5023



Description

Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to disclose information such as generated power and electricity sold back to the grid stored in the product, tamper with or destroy stored or configured information in the product, or cause a Denial-of-Service (DoS) condition on the product, by using hardcoded user ID and password common to the product series obtained by exploiting CVE-2025-5022. However, the product is not affected by this vulnerability when it remains unused for a certain period of time (default: 5 minutes) and enters the power-saving mode with the display unit's LCD screen turned off. The affected products discontinued in 2015, support ended in 2020.

Reserved 2025-05-21 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Mitsubishi


HIGH: 7.1CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H

Problem types

CWE-798 Use of Hard-coded Credentials

Product status

Default status
unaffected

All versions
affected

Default status
unaffected

All versions
affected

References

www.mitsubishielectric.com/...nerability/pdf/2025-007_en.pdf vendor-advisory

cve.org (CVE-2025-5023)

nvd.nist.gov (CVE-2025-5023)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5023

Support options

Helpdesk Chat, Email, Knowledgebase