CVE-2022-31491, CVE-2022-43110 - Voltronic Viewpower/Pro and rebrands/derivatives
Overview
The Voltonic Viewpower/ViewPowerPro software (just referred to as ViewPower from this point forward) is designed to manage/monitor UPS (Uninteruptable Power Supply) systems. The software has several design shortcomings that lead to critical vulnerabilities, including a trivially exploited RCE (Remote Code Execution) vulnerability that requires no special tooling on the part of the attacker.
According to Voltronics own website (wayback machine option) they are ...100% ODM... and ...do not compete with our customers in any market segments. As such, The Voltronic software appears to also be rebranded/resold under other names. NetGuard (PowerShield) is one such known variant.
There is no exhaustive list of other rebranded versions of this software known to us at this time. Voltronic have been silent.
The Voltronic Editions/Versions
As mentioned, the Voltronics main website itself has 2 main editions, ViewPower and ViewPowerPro (again, in general when we mention ViewPower we mean both/either). Interestingly the versions listed on the website are actually different to what you get in the installer. We have no idea about the version control processes at Voltronic, so sorry if this adds to your confusion.
As at 17th June 2025, the table below hopefully paints this picture a little better using the Windows versions available as an example. Click version links for image of website or add/remove. Take care even when downloading for other Operating Systems that you get what you expect.
| Edition | Link | Website version | Installed version | Status | |
|---|---|---|---|---|---|
| ViewPower | Downloads | 1.04-21344 | 1.04-21353 | Confirmed still vulnerable to both CVE-2022-43110 and CVE-2022-31491 |
|
| ViewPowerPro | Downloads | 2.0-20363 | 2.0-22165 | Confirmed as still vulnerable to CVE-2022-31491 |
Other places we've found it hosted
Apart from the Voltronic main website, there appear to be different (and newer) versions again of ViewPower/Pro hosted on different sites, some of them are resellers of the UPS hardware and thus also host the ViewPower/Pro software. One example is www.power-software-download.com They appear to be signed as expected. This again raises questions around version control, of which we don't know the answers, but its important you're aware of it regardless.
As at 17th June 2025, the table below hopefully paints this picture a little better using the Windows versions from www.power-software-download.com as an example. They're clearly newer versions for at lease one of these than on the main Voltronic Website. This list is not exhaustive and may not be updated. It is however an example of why you need to be careful around the version you have installed/downloaded.
| Edition | Link | Installed version | Status | |
|---|---|---|---|---|
| ViewPower | Downloads | 1.04-24215 | Confirmed still vulnerable to CVE-2022-31491 |
|
| ViewPowerPro | Downloads | 2.0-22165 | Confirmed as still vulnerable to CVE-2022-31491 |
As at 27th Aug 2025, we found an attempted fix published at www.power-software-download.com. They now have some version mismatching going on between what the website announced and the actual version that installs. The attempted fix implemented in verion 1.04.25210 is easily circumvented. This fix on its own just changes the way the payload needs to be formatted. Its still a full RCE. There is also no announcement on the website about this attempted fix, any mention of the CVE or even a simple advisory.
| Edition | Link | Website version | Installed version | Status | |
|---|---|---|---|---|---|
| ViewPower | Downloads | 1.04-25210 | 1.04-25210 | Confirmed still vulnerable to CVE-2022-31491 with change to the format of the payload. Full RCE. |
|
| ViewPowerPro | Downloads | 2.0-25210 | 2.0-22165 mismatch | Confirmed as still vulnerable to CVE-2022-31491 |
Known rebranded/variants
As at 17th June 2025, represents some known variants. There are more, so this list is not exhaustive, and probably won't be updated.
| Edition | Link | Version | Status |
|---|---|---|---|
| PowerShield Netguard | Downloads | 1.04-23292 | Confirmed fixed. NOT vulnerable to either CVE-2022-43110 or CVE-2022-31491 |
CVE-2022-43110
The UPS management software is supposed to only allow a properly Authenticated and Authorized admin user using a web interface to configure the system.
Due to CWE-425: Direct Request ('Forced Browsing') an unauthorised, unauthenticated remote attacker can make changes to the system including: changing the web interface admin password, view/change system configuration, enumerate connected UPS devices and shut down connected UPS devices. This extends to being able to configure operating system commands that should run if the system detects a connected UPS shutting down.
CVE-2022-31491
The UPS management software normally allows a properly Authenticated and Authorized user using a web interface to configure the system to run a single OS command of the users choosing when the software detects a managed UPS is shutting down. For example stop a batch job or send an alert to another system via a single command.
Due to a related critical underlying function being exposed over the network CWE-749: Exposed Unsafe Active Functionality with no Authentication or Authorization an attacker can use this to run arbitrary code immediately regardless of any managed UPS state or presence.
Q: How can I tell if I have this software ?
If you have Voltronic Viewpower or a rebranded product, its interface will likley look similar to one of the image below. It is quite a unique looking java app. The main "ViewPower" bold title may be different and match the rebranding company name your software came from.
ViewPowerPro appears a bit different to ViewPower.
Another quick/dirty way to check is to look across your system for a group of Java classes that ViewPower and the known rebranded products have in their .JAR files. This is a powershell script to do exactly that on Windows (searches on C\: so modify/rerun as required). If you have a Linux/Mac system you can use the information in script to fashion your own script to search across JAR files on your system. Note:
- Run this as Administrator or similar to ensure it has access to see .jar files. Modify the $searchPath property and rerun to catch all your drives.
- If these classes are found it it highly likely that you have ViewPower or a possible variant. It does NOT detect the presence of the vulns. Confirm that your installation is patched. Check with your vendor.
- This script does not detect the vulns themselves, or if your installation is patched, it merely indicates the likely precence of ViewPower or a variant on your system.
- This script takes into account a spelling difference we noticed across ViewPower and variants. Processer vs Processor on one of the classes.
Write-Output "Version 1.6"
# Search a windows systems for a few Java classes that appear to be unique/indicative of ViewPower or rebranded product installed on Windows.
# These are 3 random classes that appear to be consistent across the Viewpower original and currently known variant/rebranded products at the time of writing.
# Java classes may also be found on Linux an Mac variants. No script supplied for those OS, give this to one of your IT gurus for them to create one from.
# Note:
# Run this as Administrator or similar to ensure it has access to see .jar files. Modify the $searchPath property and rerun to catch all your drives.
# If these classes are found it it highly likely that you have ViewPower or a possible variant. It does NOT detect the presence of the vulns. Confirm that your installation is patched. Check with your vendor.
#️ This script does not detect the vulns themselves, or if your installation is patched, it merely indicates the likely precence of ViewPower or a variant on your system.
# This script takes into account a spelling difference we noticed across ViewPower and variants. Processer vs Processor on one of the classes.
Add-Type -AssemblyName System.IO.Compression.FileSystem
$searchPath = "c:\" # Modify this and re-run if server/device has other drives
$totalMatches = 0
Get-ChildItem -Path $searchPath -Recurse -Filter *.jar -ErrorAction SilentlyContinue | ForEach-Object {
$jarPath = $_.FullName
$zip = [IO.Compression.ZipFile]::OpenRead($jarPath)
foreach ($entry in $zip.Entries) {
if ($entry -like 'cn/com/voltronicpower/monitor/AbstractMonitorProcesser.class' -or
$entry -like 'cn/com/voltronicpower/monitor/AbstractMonitorProcessor.class' -or
$entry -like 'cn/com/voltronic/console/DisplayItems.class' -or
$entry -like 'cn/com/voltronicpower/tomcat/Cmd.class'){
Write-Output "$jarPath $entry"
$totalMatches++
}
}
$zip.Dispose()
}
Write-Output "Total matches $totalMatches"
Write-Output "This script looks for the software. It does NOT check if the vulns are present or not. It does NOT check if you are patched."
This is the output on a Windows 10 system with Voltronic Viewpower installed.
Q: What should I do if I have this ?
If you have this in your environment and you can't confirm its fixed/patched, consider the following options (in no particular order). On our equipment we took the first option.
- 🗑️ Uninstall it or disconnect the machine from the network. (Hint: take this option)
- 🔥 Ensure your firewalls are not allowing inbound traffic from untrusted networks.
- 🛠️ Check for a patched version/release.
- 🧑💼 Contacting the vendor/supplier.
If you find the software, and you believe you're patched... double check. Given we could not confirm version control is going on, you need to be VERY sure.
☝️ More Questions & Answers
Q: Did you try to contact Voltronic ?
A: Yes. We're also aware of other players in the IT security space that have tried and failed to get meaningful contact.
Q: What is the relationship between Voltronic and the rebranding vendors ?
A: We don't know specifics about how the relationships work with rebranding vendors, or even how the relationships between voltronic divisions work.
Q: Do you have any PoC code ?
A: Yes, for both CVEs. But its not on this page yet. We will publish more info here at some stage in the future. Lets give folks a chance to remediate/remove the software.
Q: Did you write a Metasploit module ?
A: Yes, for CVE-2022-31491. It can target ViewPower/ViewPowerPro and known variants across Operating Systems and return a shell with excellent reliability. However, lets give folks a chance to remediate/remove the software before we provide details/source. No source code here yet, but here's a screenshot of it in action...click to enlarge
Q: Are there any "vendor" related advisories that you're aware of ?
A: We've not found anything meaningful mentioning the CVE's from Voltronic (As at 29th Aug 2025).
Q: Can you tell me more about impacted Operating Systems ?
A: We tested with ViewPower installed across multiple Windows versions, and also Linux (Ubuntu workstation). But we did not test on Mac platform. However given PowerShield issued a patch for Mac, and given the Java classes in the product we believe with high certainty that Mac versions are also impacted.
Q: Does Voltronics have any sort of version control ?
A: We don't know.
Q: Does Voltronic have an AppSec program including code reviews and pentesting ?
A: We don't know.
Q: Could there be other/similar issues across the rest of Voltronics software estate ?
A: We don't know.
Q: Does Voltronics take security seriously ?
A: We don't know.
Q: What if I just have the software and no actual UPS connected to that machine ?
A: It doesn't matter. The vulnerabilites still exist and can be exploited. In fact, we tested the Metasploit module against machines with a UPS connected, and ones without.
Q: How did you find these issues ?
A: As many IT professionals do, there was the purchase of 2 UPS units. This was followed by some curiousity about the software that came with them.
Q: Is there an official cool name for the CVE-2022-31491 vuln ?
A: No.
Q: Will you blog further about this ?
A: Probably. Check back here in the coming weeks/months.
Q: How can someone reach out to you ?
A: Home page has a contact at the bottom.
Q: Any disclaimer ?
A: Yes. The information provided is for general knowledge and discussion purposes only. Individuals should perform their own risk assessments and consider their specific environments and requirements before acting on any of the content. The views expressed are solely those of the author(s) and do not represent the views of any current or former employers. The views here may not even be those of the author(s), so... like anything on the internet, check before you act.
Other links/info
Various links to stuff that we think may be relevant in some way.
v005