Voltronic Power ViewPower Pro
Voltronic Power ViewPower Pro versions 2.0-22165 and earlier contain three critical vulnerabilities: insecure deserialization (CWE-502) allowing arbitrary object instantiation, missing authentication on sensitive operations (CWE-306), and command injection (CWE-78) enabling code execution. These issues can be exploited remotely over the network without credentials to achieve denial of service, extract administrator credentials, or execute arbitrary commands on the management system. Voltronic Power has not responded to CISA coordination efforts and no patch has been released.
- Network reachability to ViewPower Pro web interface (typically HTTP/HTTPS)
- No authentication required for exploitation
- Device running ViewPower Pro version 2.0-22165 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c9c55428-42d7-407b-8387-d3e33a7a1417Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.