CVE-2025-10504: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
AI Analysis
Technical Summary
CVE-2025-10504 is a heap-based buffer overflow vulnerability identified in the ABB Terra AC wallbox, a product used for electric vehicle charging. The vulnerability is classified under CWE-122, indicating that improper handling of memory buffers on the heap can lead to overflow conditions. This flaw affects versions of the Terra AC wallbox up to and including version 1.8.33. A heap-based buffer overflow occurs when a program writes more data to a buffer located on the heap than it is allocated to hold, potentially overwriting adjacent memory, which can lead to arbitrary code execution, crashes, or corruption of data. According to the CVSS 4.0 vector, the vulnerability requires local access (AV:L), has high attack complexity (AC:H), requires privileged attacker permissions (PR:H), and requires no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a high degree (VC:N, VI:H, VA:H), with limited scope (S:L) and low severity (SA:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on September 29, 2025, with the vendor ABB as the assigner. Given the nature of the device as a wallbox for EV charging, exploitation could allow an attacker with local privileged access to execute arbitrary code or cause denial of service, potentially disrupting charging operations or compromising device integrity.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure, energy management, or facilities management, this vulnerability poses a risk of operational disruption and potential safety hazards. The Terra AC wallbox is likely deployed in commercial, residential, and public charging stations across Europe. Exploitation could lead to denial of service, preventing EV charging and impacting mobility services. Furthermore, if attackers gain code execution, they could manipulate charging data, interfere with billing systems, or use the compromised device as a foothold into broader network environments. This is particularly critical for organizations managing large fleets of EVs or public charging infrastructure, where availability and data integrity are paramount. The requirement for local privileged access limits remote exploitation risk but does not eliminate insider threats or attacks via compromised local networks. The medium severity rating suggests a moderate but non-trivial risk that should be addressed promptly to maintain operational continuity and trust in EV infrastructure.
Mitigation Recommendations
1. Immediate deployment of vendor-provided patches or firmware updates once available is critical. Since no patches are currently linked, organizations should monitor ABB advisories closely. 2. Restrict physical and local network access to the Terra AC wallbox devices to trusted personnel only, implementing strict access controls and network segmentation to limit exposure. 3. Employ host-based intrusion detection systems (HIDS) or endpoint protection solutions on management systems interfacing with the wallbox to detect anomalous behavior indicative of exploitation attempts. 4. Conduct regular security audits and vulnerability assessments on EV charging infrastructure to identify and remediate potential weaknesses. 5. Implement strict privilege management policies to minimize the number of users with local administrative rights on devices controlling the wallbox. 6. Establish monitoring and alerting for unusual device behavior, such as unexpected reboots or communication anomalies, which could indicate exploitation attempts. 7. Develop incident response plans specific to EV infrastructure to quickly contain and remediate any compromise related to this vulnerability.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom, Belgium, Denmark
CVE-2025-10504: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox
Description
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.
AI-Powered Analysis
Technical Analysis
CVE-2025-10504 is a heap-based buffer overflow vulnerability identified in the ABB Terra AC wallbox, a product used for electric vehicle charging. The vulnerability is classified under CWE-122, indicating that improper handling of memory buffers on the heap can lead to overflow conditions. This flaw affects versions of the Terra AC wallbox up to and including version 1.8.33. A heap-based buffer overflow occurs when a program writes more data to a buffer located on the heap than it is allocated to hold, potentially overwriting adjacent memory, which can lead to arbitrary code execution, crashes, or corruption of data. According to the CVSS 4.0 vector, the vulnerability requires local access (AV:L), has high attack complexity (AC:H), requires privileged attacker permissions (PR:H), and requires no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a high degree (VC:N, VI:H, VA:H), with limited scope (S:L) and low severity (SA:L). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on September 29, 2025, with the vendor ABB as the assigner. Given the nature of the device as a wallbox for EV charging, exploitation could allow an attacker with local privileged access to execute arbitrary code or cause denial of service, potentially disrupting charging operations or compromising device integrity.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure, energy management, or facilities management, this vulnerability poses a risk of operational disruption and potential safety hazards. The Terra AC wallbox is likely deployed in commercial, residential, and public charging stations across Europe. Exploitation could lead to denial of service, preventing EV charging and impacting mobility services. Furthermore, if attackers gain code execution, they could manipulate charging data, interfere with billing systems, or use the compromised device as a foothold into broader network environments. This is particularly critical for organizations managing large fleets of EVs or public charging infrastructure, where availability and data integrity are paramount. The requirement for local privileged access limits remote exploitation risk but does not eliminate insider threats or attacks via compromised local networks. The medium severity rating suggests a moderate but non-trivial risk that should be addressed promptly to maintain operational continuity and trust in EV infrastructure.
Mitigation Recommendations
1. Immediate deployment of vendor-provided patches or firmware updates once available is critical. Since no patches are currently linked, organizations should monitor ABB advisories closely. 2. Restrict physical and local network access to the Terra AC wallbox devices to trusted personnel only, implementing strict access controls and network segmentation to limit exposure. 3. Employ host-based intrusion detection systems (HIDS) or endpoint protection solutions on management systems interfacing with the wallbox to detect anomalous behavior indicative of exploitation attempts. 4. Conduct regular security audits and vulnerability assessments on EV charging infrastructure to identify and remediate potential weaknesses. 5. Implement strict privilege management policies to minimize the number of users with local administrative rights on devices controlling the wallbox. 6. Establish monitoring and alerting for unusual device behavior, such as unexpected reboots or communication anomalies, which could indicate exploitation attempts. 7. Develop incident response plans specific to EV infrastructure to quickly contain and remediate any compromise related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-09-16T06:05:51.851Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68db1fa7a473ffe031e278ce
Added to database: 9/30/2025, 12:09:11 AM
Last enriched: 9/30/2025, 12:12:08 AM
Last updated: 10/1/2025, 12:09:21 AM
Views: 4
Related Threats
CVE-2025-10847: Vulnerability in Broadcom Unified Infrastructure Management
HighCVE-2025-9512: CWE-79 Cross-Site Scripting (XSS) in Schema & Structured Data for WP & AMP
HighCVE-2025-10538: CWE-288: Authentication Bypass Using an Alternate Path or Channel in LG Innotek Camera Model LND7210
HighCVE-2025-9075: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bdthemes ZoloBlocks – Gutenberg Block Editor Plugin with Advanced Blocks, Dynamic Content, Templates & Patterns
MediumCVE-2025-10744: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover File Manager, Code Editor, and Backup by Managefy
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.