Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5740: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Schneider Electric EVLink WallBox

0
High
VulnerabilityCVE-2025-5740cvecve-2025-5740cwe-22
Published: Tue Jun 10 2025 (06/10/2025, 08:06:49 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EVLink WallBox

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause arbitrary file writes when an authenticated user on the web server manipulates file path.

AI-Powered Analysis

AILast updated: 10/07/2025, 04:07:52 UTC

Technical Analysis

CVE-2025-5740 is a path traversal vulnerability classified under CWE-22 found in Schneider Electric's EVLink WallBox, a widely deployed electric vehicle charging station. The vulnerability arises from improper validation and limitation of file pathnames on the device's embedded web server. An authenticated user with high privileges can manipulate file path parameters to write arbitrary files outside the intended restricted directories. This flaw enables attackers to overwrite critical configuration or system files, potentially leading to device compromise, persistent backdoors, or denial of service. The vulnerability affects all versions of the EVLink WallBox, indicating a systemic issue in the product's input validation mechanisms. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) highlights that the vulnerability is remotely exploitable over the network with low attack complexity, requires high privileges but no user interaction, and impacts confidentiality, integrity, and availability severely. No patches have been released yet, and no exploits are publicly known, but the risk remains high due to the critical nature of the device in energy infrastructure. The vulnerability could be leveraged to disrupt EV charging services or pivot into broader network environments if the device is connected to enterprise networks.

Potential Impact

For European organizations, especially those in the energy and transportation sectors, this vulnerability poses a significant risk to operational continuity and infrastructure security. EVLink WallBoxes are integral to electric vehicle charging infrastructure, which is critical for sustainable transport initiatives across Europe. Exploitation could lead to unauthorized modification or deletion of system files, causing device malfunction or denial of service, disrupting EV charging availability. This disruption could affect fleet operators, public charging stations, and private installations, impacting business operations and user trust. Furthermore, compromised devices could serve as footholds for lateral movement within enterprise networks, risking broader IT infrastructure. Given the strategic push for green energy and EV adoption in Europe, the vulnerability could have cascading effects on energy management and smart grid systems. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits rapidly once details are public.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the EVLink WallBox web interface to trusted administrators only, ideally through network segmentation and VPNs. Organizations should enforce strong authentication mechanisms and monitor access logs for unusual activity indicative of exploitation attempts. Until Schneider Electric releases official patches, consider disabling or limiting web server functionalities if feasible. Employ network intrusion detection systems (NIDS) with signatures or anomaly detection tailored to EVLink traffic patterns. Regularly audit device configurations and firmware versions to identify affected units. Engage with Schneider Electric support channels to obtain updates on patch availability and apply them promptly once released. Additionally, implement compensating controls such as application-layer firewalls or reverse proxies to filter and sanitize web requests targeting the device. For critical infrastructure, establish incident response plans that include EVLink WallBox compromise scenarios to minimize downtime and data loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-05T15:26:04.067Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f591b0bd07c3938a9db

Added to database: 6/10/2025, 6:54:17 PM

Last enriched: 10/7/2025, 4:07:52 AM

Last updated: 11/22/2025, 4:45:15 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats