CVE ID | CVE-2025-5749 |
CVSS SCORE | 6.3, AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
AFFECTED VENDORS |
WOLFBOX |
AFFECTED PRODUCTS |
Level 2 EV Charger |
VULNERABILITY DETAILS |
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. |
ADDITIONAL DETAILS |
ZDI made several attempts to contact the vendor using the contact information on their website, as well as trying to reach them on various social platforms which yielded no response. -- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product |
DISCLOSURE TIMELINE |
|
CREDIT | Tobias Scharnowski, Felix Buchmann, and Kristian Covic of fuzzware.io |