Advisory Details

June 6th, 2025

(0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability

ZDI-25-326
ZDI-CAN-26501

CVE ID CVE-2025-5747
CVSS SCORE 8.0, AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS WOLFBOX
AFFECTED PRODUCTS Level 2 EV Charger
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installatons of WOLFBOX Level 2 EV Charger devices. Authentication is required to exploit this vulnerability.

The specific flaw exists within the handling of command frames received by the MCU. When parsing frames, the process does not properly detect the start of a frame, which can lead to misinterpretation of input. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device.

ADDITIONAL DETAILS

ZDI made several attempts to contact the vendor using the contact information on their website, as well as trying to reach them on various social platforms which yielded no response. -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product


DISCLOSURE TIMELINE
  • 2025-05-15 - Vulnerability reported to vendor
  • 2025-06-06 - Coordinated public release of advisory
  • 2025-06-06 - Advisory Updated
CREDIT PHP Hooligans
BACK TO ADVISORIES