CVE-2025-10504: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
AI Analysis
Technical Summary
CVE-2025-10504 is a heap-based buffer overflow vulnerability classified under CWE-122, found in ABB Terra AC wallbox devices up to firmware version 1.8.33. This vulnerability arises from improper handling of heap memory, where an attacker with authenticated, high-privilege remote access can trigger a buffer overflow condition. Such a condition can corrupt adjacent memory, potentially leading to application crashes, denial of service, or manipulation of device behavior compromising integrity. The CVSS 4.0 vector indicates that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no user interaction (UI:N), and no privileges required for attack initiation (PR:H), meaning the attacker must have high privileges but no user interaction is needed. The vulnerability impacts availability and integrity but not confidentiality. No public exploits or patches are currently available, and the vulnerability was published on September 29, 2025. ABB Terra AC wallboxes are widely used in electric vehicle charging infrastructure, making this vulnerability relevant to critical energy and transportation sectors. The lack of known exploits suggests limited current risk, but the potential impact on EV charging availability and device integrity warrants proactive mitigation.
Potential Impact
For European organizations, this vulnerability could disrupt electric vehicle charging infrastructure, leading to denial of service or compromised device integrity. This can affect fleet operations, public charging stations, and private installations, potentially causing operational downtime and financial losses. The integrity impact may allow attackers to manipulate charging parameters or device behavior, risking safety and reliability. Given the increasing reliance on EV infrastructure in Europe, especially in countries pushing for green energy and EV adoption, this vulnerability could have cascading effects on transportation and energy sectors. The requirement for high privileges limits exploitation to insiders or attackers who have already compromised credentials, reducing broad external threat risk but increasing concern for targeted attacks or insider threats. The absence of confidentiality impact reduces risks related to data leakage but does not eliminate operational risks.
Mitigation Recommendations
European organizations should implement strict network segmentation to isolate ABB Terra AC wallboxes from general network access, limiting exposure to high-privilege users only. Employ strong authentication and access controls to prevent unauthorized privilege escalation. Monitor device logs and network traffic for anomalous activity indicative of exploitation attempts. Since no patches are currently available, coordinate with ABB for timely updates and apply firmware upgrades as soon as they are released. Conduct regular security audits and vulnerability assessments on EV charging infrastructure. Implement intrusion detection systems tailored to detect buffer overflow exploitation patterns. Additionally, consider deploying endpoint protection solutions capable of detecting memory corruption attempts. Establish incident response plans specifically addressing EV infrastructure compromise scenarios.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-10504: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox
Description
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
AI-Powered Analysis
Technical Analysis
CVE-2025-10504 is a heap-based buffer overflow vulnerability classified under CWE-122, found in ABB Terra AC wallbox devices up to firmware version 1.8.33. This vulnerability arises from improper handling of heap memory, where an attacker with authenticated, high-privilege remote access can trigger a buffer overflow condition. Such a condition can corrupt adjacent memory, potentially leading to application crashes, denial of service, or manipulation of device behavior compromising integrity. The CVSS 4.0 vector indicates that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no user interaction (UI:N), and no privileges required for attack initiation (PR:H), meaning the attacker must have high privileges but no user interaction is needed. The vulnerability impacts availability and integrity but not confidentiality. No public exploits or patches are currently available, and the vulnerability was published on September 29, 2025. ABB Terra AC wallboxes are widely used in electric vehicle charging infrastructure, making this vulnerability relevant to critical energy and transportation sectors. The lack of known exploits suggests limited current risk, but the potential impact on EV charging availability and device integrity warrants proactive mitigation.
Potential Impact
For European organizations, this vulnerability could disrupt electric vehicle charging infrastructure, leading to denial of service or compromised device integrity. This can affect fleet operations, public charging stations, and private installations, potentially causing operational downtime and financial losses. The integrity impact may allow attackers to manipulate charging parameters or device behavior, risking safety and reliability. Given the increasing reliance on EV infrastructure in Europe, especially in countries pushing for green energy and EV adoption, this vulnerability could have cascading effects on transportation and energy sectors. The requirement for high privileges limits exploitation to insiders or attackers who have already compromised credentials, reducing broad external threat risk but increasing concern for targeted attacks or insider threats. The absence of confidentiality impact reduces risks related to data leakage but does not eliminate operational risks.
Mitigation Recommendations
European organizations should implement strict network segmentation to isolate ABB Terra AC wallboxes from general network access, limiting exposure to high-privilege users only. Employ strong authentication and access controls to prevent unauthorized privilege escalation. Monitor device logs and network traffic for anomalous activity indicative of exploitation attempts. Since no patches are currently available, coordinate with ABB for timely updates and apply firmware upgrades as soon as they are released. Conduct regular security audits and vulnerability assessments on EV charging infrastructure. Implement intrusion detection systems tailored to detect buffer overflow exploitation patterns. Additionally, consider deploying endpoint protection solutions capable of detecting memory corruption attempts. Establish incident response plans specifically addressing EV infrastructure compromise scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-09-16T06:05:51.851Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68db1fa7a473ffe031e278ce
Added to database: 9/30/2025, 12:09:11 AM
Last enriched: 10/16/2025, 6:53:19 AM
Last updated: 11/14/2025, 9:29:46 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13185: Unrestricted Upload in Bdtask News365
MediumCVE-2025-63745: n/a
MediumCVE-2025-64084: n/a
UnknownCVE-2025-63744: n/a
UnknownCVE-2025-13182: Cross Site Scripting in pojoin h3blog
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.