Skip to main content

CVE-2025-24285: Vulnerability in Ubiquiti Inc UniFi Connect EV Station Lite

Critical
VulnerabilityCVE-2025-24285cvecve-2025-24285
Published: Thu Aug 21 2025 (08/21/2025, 00:01:24 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Connect EV Station Lite

Description

Multiple Improper Input Validation vulnerabilities in UniFi Connect EV Station Lite may allow a Command Injection by a malicious actor with network access to the UniFi Connect EV Station Lite. Affected Products: UniFi Connect EV Station Lite (Version 1.5.1 and earlier) Mitigation: Update UniFi Connect EV Station Lite to Version 1.5.2 or later

AI-Powered Analysis

AILast updated: 08/28/2025, 01:24:47 UTC

Technical Analysis

CVE-2025-24285 is a critical vulnerability identified in the UniFi Connect EV Station Lite product by Ubiquiti Inc, specifically affecting versions 1.5.1 and earlier. The vulnerability arises from multiple improper input validation issues that allow an unauthenticated attacker with network access to the device to perform command injection attacks. Command injection (CWE-77) vulnerabilities enable attackers to execute arbitrary commands on the underlying operating system, potentially leading to full system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with attack vector as network (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without authentication or user interaction, leading to complete control over the affected device. The UniFi Connect EV Station Lite is a network-connected electric vehicle charging station controller, which implies that exploitation could impact the operational integrity of EV charging infrastructure. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make this a significant threat. The vendor has released version 1.5.2 to address this issue, and upgrading to this or later versions is the primary mitigation.

Potential Impact

For European organizations, the impact of this vulnerability is substantial, particularly for entities involved in electric vehicle infrastructure, such as charging station operators, energy providers, and smart city projects. Exploitation could lead to unauthorized control over EV charging stations, resulting in service disruption, denial of charging services, or manipulation of charging parameters. This could cause operational downtime, financial losses, and reputational damage. Additionally, compromised EV stations could be leveraged as entry points into broader corporate or municipal networks, facilitating lateral movement and further attacks. Given the increasing adoption of EV infrastructure in Europe, especially in countries with aggressive green energy policies, the risk extends to critical infrastructure sectors. The confidentiality breach could expose sensitive operational data, while integrity and availability impacts could disrupt essential services. The lack of required authentication and user interaction increases the risk of automated or widespread exploitation attempts.

Mitigation Recommendations

European organizations should immediately verify the version of UniFi Connect EV Station Lite devices in their environment and prioritize upgrading all affected units to version 1.5.2 or later. Network segmentation should be enforced to isolate EV charging infrastructure from critical internal networks, limiting exposure to potential attackers. Implement strict access controls and monitoring on network segments hosting these devices to detect anomalous activities indicative of exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned for command injection patterns. Regularly audit device configurations and logs for signs of compromise. Additionally, organizations should engage with Ubiquiti support channels for any further security advisories or patches. Where possible, disable unnecessary network services on the devices to reduce the attack surface. Finally, incorporate this vulnerability into incident response planning to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-01-17T01:00:07.457Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a6693fad5a09ad0009f8ff

Added to database: 8/21/2025, 12:33:03 AM

Last enriched: 8/28/2025, 1:24:47 AM

Last updated: 9/3/2025, 1:46:50 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats