Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52264: n/a

0
High
VulnerabilityCVE-2025-52264cvecve-2025-52264
Published: Mon Oct 27 2025 (10/27/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

StarCharge Artemis AC Charger 7-22 kW v1.0.4 was discovered to contain a stack overflow via the cgiMain function at download.cgi.

AI-Powered Analysis

AILast updated: 11/03/2025, 15:01:33 UTC

Technical Analysis

CVE-2025-52264 identifies a stack-based buffer overflow vulnerability in the StarCharge Artemis AC Charger 7-22 kW, firmware version 1.0.4. The vulnerability resides in the cgiMain function handling requests to download.cgi, where improper input validation leads to a stack overflow condition (CWE-119). This flaw can be triggered remotely by an attacker with access to the local or adjacent network (CVSS vector AV:A), requiring low privileges (PR:L) but no user interaction (UI:N). Successful exploitation enables arbitrary code execution, granting the attacker full control over the device, compromising confidentiality, integrity, and availability. The device is typically deployed in electric vehicle charging infrastructure, making it a critical component in energy and transportation sectors. No patches or firmware updates have been released yet, and no public exploits are known, but the vulnerability’s nature and high CVSS score (8.0) indicate a serious risk. The stack overflow could be leveraged to disrupt charging services, manipulate billing or usage data, or pivot into broader network environments. The vulnerability’s presence in a widely used EV charger model necessitates urgent mitigation to protect critical infrastructure.

Potential Impact

For European organizations, the impact of CVE-2025-52264 is significant due to the increasing reliance on electric vehicle charging infrastructure as part of energy transition and smart city initiatives. Exploitation could lead to unauthorized control over charging stations, resulting in service outages, manipulation of charging sessions, or theft of sensitive operational data. This could disrupt transportation services, damage organizational reputation, and cause financial losses. Additionally, compromised chargers could serve as entry points for lateral movement within corporate or utility networks, escalating the risk of broader cyberattacks. Given the critical role of EV infrastructure in Europe’s green energy goals, such disruptions could have cascading effects on energy management and regulatory compliance. The vulnerability’s requirement for local or adjacent network access means that organizations with poorly segmented networks or exposed management interfaces are at higher risk. The absence of patches increases the urgency for interim controls to mitigate potential exploitation.

Mitigation Recommendations

1. Immediately restrict network access to StarCharge Artemis AC Chargers by implementing strict network segmentation and firewall rules to limit access to trusted administrators and management systems only. 2. Disable or restrict access to the download.cgi interface if possible, or monitor and log all access attempts to detect suspicious activity. 3. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns or attempts to exploit stack overflow conditions. 4. Engage with the vendor to obtain timelines for firmware patches or updates addressing this vulnerability and prioritize their deployment once available. 5. Conduct regular vulnerability assessments and penetration testing focused on EV charging infrastructure to identify and remediate related weaknesses. 6. Implement strong authentication and authorization controls for device management interfaces to reduce the risk posed by low-privilege attackers. 7. Maintain up-to-date asset inventories to quickly identify affected devices and ensure rapid response capabilities. 8. Educate operational technology (OT) and IT teams on the risks associated with this vulnerability and best practices for securing EV charging infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ff8033ba6dffc5e2fca3eb

Added to database: 10/27/2025, 2:22:43 PM

Last enriched: 11/3/2025, 3:01:33 PM

Last updated: 12/10/2025, 9:51:48 AM

Views: 128

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats