Browse all 4 CVE security advisories affecting ePower. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ePower provides energy management systems for industrial and commercial facilities. Historically, the organization has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws in their web interfaces and control systems. These issues have allowed unauthorized access to critical infrastructure components. While no major public security incidents have been widely reported, the presence of four CVEs indicates ongoing security challenges in their connected energy platforms. The company's systems, which manage power distribution and consumption, remain attractive targets for threat actors seeking to disrupt industrial operations or gain unauthorized access to facility controls.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-27770 | ePower epower.ie Insufficiently Protected Credentials — epower.ieCWE-522 | 6.5 | Medium | 2026-03-05 |
| CVE-2026-24912 | ePower epower.ie Insufficient Session Expiration — epower.ieCWE-613 | 7.3 | High | 2026-03-05 |
| CVE-2026-27778 | ePower epower.ie Improper Restriction of Excessive Authentication Attempts — epower.ieCWE-307 | 7.5 | High | 2026-03-05 |
| CVE-2026-22552 | ePower epower.ie Missing Authentication for Critical Function — epower.ieCWE-306 | 9.4 | Critical | 2026-03-05 |
This page lists every published CVE security advisory associated with ePower. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.