Tigo Energy Cloud Connect Advanced (Update A)
Tigo Energy Cloud Connect Advanced firmware versions 4.0.1 and earlier contain multiple critical vulnerabilities: hard-coded credentials allowing unauthorized administrative access (CWE-798), command injection enabling arbitrary code execution (CWE-77), and insecure session ID generation permitting session hijacking (CWE-337). Successful exploitation allows an attacker to gain full device control, modify system settings, disrupt solar energy production, interfere with safety mechanisms, and expose sensitive data. Tigo Energy is actively working on a fix but has not yet released a patched version.
- Network access to Tigo Cloud Connect Advanced device and port where the web interface or API listens
- Knowledge of hard-coded credentials (default username and password)
- Device must be reachable from the attacker's network (not isolated behind firewall)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/656703e4-15be-49cf-9a40-d8c93758a93eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.