Skip to main content

CVE-2025-5740: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric EVLink WallBox

High
VulnerabilityCVE-2025-5740cvecve-2025-5740cwe-22
Published: Tue Jun 10 2025 (06/10/2025, 08:06:49 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EVLink WallBox

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause arbitrary file writes when an unauthenticated user on the web server manipulates file path.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:03:33 UTC

Technical Analysis

CVE-2025-5740 is a high-severity path traversal vulnerability (CWE-22) affecting all versions of Schneider Electric's EVLink WallBox, a product used for electric vehicle charging infrastructure. The vulnerability arises from improper limitation of pathname inputs to restricted directories on the device's web server. Specifically, an unauthenticated attacker can manipulate file path parameters to perform arbitrary file writes on the system. This means that without any authentication or user interaction, a remote attacker can potentially write malicious files to the device's filesystem, which could lead to unauthorized code execution, system compromise, or disruption of charging services. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), and no user interaction needed (UI:N). The impact metrics indicate high confidentiality, integrity, and availability impacts (VC:H, VI:H, VA:H), meaning that exploitation could lead to full compromise of the device, data leakage, or service outages. The vulnerability is currently published with no known exploits in the wild and no patches available at the time of reporting. Given the critical role of EVLink WallBox in EV charging infrastructure, exploitation could have significant operational and safety implications.

Potential Impact

For European organizations, the impact of this vulnerability is substantial due to the increasing adoption of electric vehicles and the corresponding deployment of EV charging infrastructure. Schneider Electric is a major supplier of industrial and energy management solutions in Europe, and their EVLink WallBox units are widely used in public, commercial, and residential charging stations. Exploitation could allow attackers to disrupt charging services, potentially causing operational downtime and customer dissatisfaction. More critically, arbitrary file writes could enable attackers to implant persistent malware or backdoors, threatening the integrity and availability of charging infrastructure. This could have cascading effects on energy management systems and critical infrastructure relying on these devices. Confidentiality breaches could expose sensitive operational data or user information. The lack of authentication requirement and ease of exploitation increases the risk of widespread attacks, especially in densely deployed urban environments. Additionally, disruption of EV charging services could hinder the EU's green energy and transportation goals, affecting broader economic and environmental objectives.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. Network segmentation is critical: isolate EVLink WallBox devices on dedicated VLANs or subnets with strict firewall rules to limit access to trusted management hosts only. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious path traversal attempts targeting the device's web interface. Regularly monitor device logs and network traffic for anomalous file write activities or unauthorized access attempts. Disable any unnecessary web services or remote management interfaces on the devices to reduce the attack surface. Where possible, restrict physical and network access to the devices to authorized personnel only. Organizations should engage with Schneider Electric for timely patch releases and apply updates as soon as they become available. Additionally, consider deploying endpoint detection and response (EDR) solutions on connected management systems to detect lateral movement or exploitation attempts. Finally, conduct security awareness training for operational staff to recognize signs of compromise and report incidents promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-05T15:26:04.067Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f591b0bd07c3938a9db

Added to database: 6/10/2025, 6:54:17 PM

Last enriched: 7/11/2025, 2:03:33 AM

Last updated: 8/8/2025, 4:28:34 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats