CVE-2025-5517: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox (UL40/80A)
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (MID/ CE) -Terra AC MID, ABB Terra AC wallbox (MID/ CE) -Terra AC Juno CE, ABB Terra AC wallbox (MID/ CE) -Terra AC PTB, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): through 1.8.32; Terra AC wallbox (UL32A): through 1.8.2; Terra AC wallbox (MID/ CE) -Terra AC MID: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC Juno CE: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC PTB: through 1.8.21; Terra AC wallbox (JP): through 1.8.2.
AI Analysis
Technical Summary
CVE-2025-5517 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting ABB Terra AC wallbox models including UL40/80A, UL32A, and several MID/CE variants. The vulnerability exists in firmware versions up to 1.8.32 for most models and 1.8.2 for others. A heap-based buffer overflow occurs when the device improperly handles input data, leading to memory corruption. This can allow an attacker to overwrite critical memory regions, potentially resulting in denial of service or unauthorized code execution. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N), requires high attack complexity (AC:H), partial authentication (PR:L, AT:P), and no user interaction (UI:N). The impact on confidentiality is none, but integrity and availability impacts are high. The vulnerability does not require physical access or user interaction, increasing its risk profile. No known exploits have been reported yet, and no patches are currently available, indicating the need for proactive defensive measures. The affected devices are widely deployed in electric vehicle charging infrastructure, which is critical for energy transition efforts and smart grid integration.
Potential Impact
For European organizations, this vulnerability poses a significant risk to electric vehicle charging infrastructure, which is increasingly vital as Europe pushes for widespread EV adoption and decarbonization. Exploitation could lead to denial of service, disrupting charging availability and impacting businesses, public charging stations, and residential users. Integrity compromise could allow attackers to manipulate charging parameters or firmware, potentially causing safety hazards or damaging equipment. Given ABB’s strong market presence in Europe and the strategic importance of EV infrastructure, disruption could have cascading effects on energy management and grid stability. Critical infrastructure operators, municipalities, and large fleet operators are particularly at risk. The medium severity rating suggests a moderate but non-negligible threat, especially if combined with other vulnerabilities or insider threats. The lack of patches and known exploits means organizations must rely on preventive controls until updates are released.
Mitigation Recommendations
1. Implement strict network segmentation to isolate ABB Terra AC wallboxes from broader enterprise and critical network segments, limiting exposure to potential attackers. 2. Enforce strong authentication and access controls on management interfaces to reduce the risk of partial authentication exploitation. 3. Monitor network traffic for unusual patterns or attempts to exploit buffer overflow conditions, using IDS/IPS tuned for anomalies related to ABB device protocols. 4. Maintain asset inventories to identify all affected ABB Terra AC wallbox models and firmware versions deployed. 5. Engage with ABB support channels to obtain firmware updates or patches as soon as they become available and prioritize timely deployment. 6. Consider deploying compensating controls such as application-layer firewalls or VPNs to restrict remote access to charging stations. 7. Conduct regular security assessments and penetration testing focused on EV charging infrastructure to detect potential exploitation attempts. 8. Educate operational technology (OT) and security teams about this specific vulnerability and its implications to ensure rapid incident response readiness.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom, Italy, Spain
CVE-2025-5517: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox (UL40/80A)
Description
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (MID/ CE) -Terra AC MID, ABB Terra AC wallbox (MID/ CE) -Terra AC Juno CE, ABB Terra AC wallbox (MID/ CE) -Terra AC PTB, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): through 1.8.32; Terra AC wallbox (UL32A): through 1.8.2; Terra AC wallbox (MID/ CE) -Terra AC MID: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC Juno CE: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC PTB: through 1.8.21; Terra AC wallbox (JP): through 1.8.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-5517 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting ABB Terra AC wallbox models including UL40/80A, UL32A, and several MID/CE variants. The vulnerability exists in firmware versions up to 1.8.32 for most models and 1.8.2 for others. A heap-based buffer overflow occurs when the device improperly handles input data, leading to memory corruption. This can allow an attacker to overwrite critical memory regions, potentially resulting in denial of service or unauthorized code execution. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N), requires high attack complexity (AC:H), partial authentication (PR:L, AT:P), and no user interaction (UI:N). The impact on confidentiality is none, but integrity and availability impacts are high. The vulnerability does not require physical access or user interaction, increasing its risk profile. No known exploits have been reported yet, and no patches are currently available, indicating the need for proactive defensive measures. The affected devices are widely deployed in electric vehicle charging infrastructure, which is critical for energy transition efforts and smart grid integration.
Potential Impact
For European organizations, this vulnerability poses a significant risk to electric vehicle charging infrastructure, which is increasingly vital as Europe pushes for widespread EV adoption and decarbonization. Exploitation could lead to denial of service, disrupting charging availability and impacting businesses, public charging stations, and residential users. Integrity compromise could allow attackers to manipulate charging parameters or firmware, potentially causing safety hazards or damaging equipment. Given ABB’s strong market presence in Europe and the strategic importance of EV infrastructure, disruption could have cascading effects on energy management and grid stability. Critical infrastructure operators, municipalities, and large fleet operators are particularly at risk. The medium severity rating suggests a moderate but non-negligible threat, especially if combined with other vulnerabilities or insider threats. The lack of patches and known exploits means organizations must rely on preventive controls until updates are released.
Mitigation Recommendations
1. Implement strict network segmentation to isolate ABB Terra AC wallboxes from broader enterprise and critical network segments, limiting exposure to potential attackers. 2. Enforce strong authentication and access controls on management interfaces to reduce the risk of partial authentication exploitation. 3. Monitor network traffic for unusual patterns or attempts to exploit buffer overflow conditions, using IDS/IPS tuned for anomalies related to ABB device protocols. 4. Maintain asset inventories to identify all affected ABB Terra AC wallbox models and firmware versions deployed. 5. Engage with ABB support channels to obtain firmware updates or patches as soon as they become available and prioritize timely deployment. 6. Consider deploying compensating controls such as application-layer firewalls or VPNs to restrict remote access to charging stations. 7. Conduct regular security assessments and penetration testing focused on EV charging infrastructure to detect potential exploitation attempts. 8. Educate operational technology (OT) and security teams about this specific vulnerability and its implications to ensure rapid incident response readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-06-03T08:51:33.612Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f6838cb7571ea2b17f2afb
Added to database: 10/20/2025, 6:46:36 PM
Last enriched: 10/20/2025, 7:01:37 PM
Last updated: 10/20/2025, 9:47:16 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11536: CWE-918 Server-Side Request Forgery (SSRF) in bdthemes Element Pack Addons for Elementor
MediumCVE-2025-54764: n/a
HighCVE-2025-61303: n/a
UnknownCVE-2025-61301: n/a
UnknownCVE-2025-60781: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.