News

However, they note that although control over the device is not complete, a threat actor has access to the inverter's configuration parameters and can modify them. Hijacking Growatt inverters ...