EG4 Electronics EG4 Inverters Download of Code Without Integrity Check
The affected product allows firmware updates to be downloaded from EG4's
website, transferred via USB dongles, or installed through EG4's
Monitoring Center (remote, cloud-connected interface) or via a serial
connection, and can install these files without integrity checks. The
TTComp archive format used for the firmware is unencrypted and can be
unpacked and altered without detection.
EG4 has acknowledged the vulnerabilities and is actively working on a
fix, including new hardware expected to release by October 15, 2025.
Until then, EG4 will actively monitor all installed systems and work
with affected users on a case-by-case basis if anomalies are observed.
For more information, contact EG4. https://eg4electronics.com/contact/
Exploits
Credits
finder
Anthony Rose of BC Security reported these vulnerabilities to CISA.