Tigo Energy Cloud Connect Advanced (Update A)
Tigo Energy Cloud Connect Advanced contains multiple critical vulnerabilities that allow attackers to gain unauthorized administrative access using hard-coded credentials (CWE-798), execute arbitrary commands via command injection (CWE-77), and bypass authentication by forging session IDs due to insecure session generation (CWE-337). Successful exploitation could allow full control of the device, modification of solar inverter settings, disruption of energy production, interference with safety mechanisms, exposure of sensitive data, and creation of persistent backdoor access through valid session tokens. The device is affected when running version 4.0.1 and earlier. Tigo Energy states it is actively working on a fix but has not yet released a patch.
- Network access to the Cloud Connect Advanced device (directly or via compromised network)
- No valid user credentials required—hard-coded credentials are embedded in the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/656703e4-15be-49cf-9a40-d8c93758a93e