PT-2025-24285 · Wolfbox · Wolfbox Level 2 Ev Charger

Rafal Goryl

·

Published

2025-06-06

·

Updated

2025-08-14

·

CVE-2025-5750

CVSS v3.1
8.8
VectorAV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions WOLFBOX Level 2 EV Charger (affected versions not specified)
Description This issue allows network-adjacent attackers to execute arbitrary code on affected installations. Authentication is not required to exploit this issue. The flaw exists within the handling of the
secKey
,
localKey
,
stdTimeZone
, and
devId
parameters, resulting from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this issue to execute code in the context of the device.
Recommendations At the moment, there is no information about a newer version that contains a fix for this issue.

Fix

RCE

Heap Based Buffer Overflow

Weakness Enumeration

Related Identifiers

CVE-2025-5750
ZDI-25-329

Affected Products

Wolfbox Level 2 Ev Charger