We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53520

EG4 Electronics EG4 Inverters Download of Code Without Integrity Check



Description

The affected product allows firmware updates to be downloaded from EG4's website, transferred via USB dongles, or installed through EG4's Monitoring Center (remote, cloud-connected interface) or via a serial connection, and can install these files without integrity checks. The TTComp archive format used for the firmware is unencrypted and can be unpacked and altered without detection.

Reserved 2025-07-30 | Published 2025-08-08 | Updated 2025-08-08 | Assigner icscert


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-494

Product status

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Default status
unaffected

all versions
affected

Credits

Anthony Rose of BC Security reported these vulnerabilities to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-219-07

eg4electronics.com/contact/

cve.org (CVE-2025-53520)

nvd.nist.gov (CVE-2025-53520)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53520

Support options

Helpdesk Chat, Email, Knowledgebase