Skip to main content

CVE-2025-5743: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Schneider Electric EVLink WallBox

High
VulnerabilityCVE-2025-5743cvecve-2025-5743cwe-78
Published: Tue Jun 10 2025 (06/10/2025, 08:15:42 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: EVLink WallBox

Description

CWE-78: I Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote control over the charging station when an authenticated user modifies configuration parameters on the web server.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:16:16 UTC

Technical Analysis

CVE-2025-5743 is a high-severity OS command injection vulnerability (CWE-78) found in Schneider Electric's EVLink WallBox, a product used for electric vehicle charging. The vulnerability arises from improper neutralization of special elements in OS commands within the web server interface of the WallBox. Specifically, an authenticated user who has access to modify configuration parameters on the device's web server can exploit this flaw to inject arbitrary OS commands. This can lead to remote control over the charging station, allowing an attacker to execute commands with the privileges of the web server process. The vulnerability affects all versions of the EVLink WallBox, indicating a systemic issue in the product's input validation and command execution logic. The CVSS v4.0 base score is 7.0, reflecting a high severity due to the network attack vector, low attack complexity, no user interaction, and the requirement of high privileges (authenticated user). The impact on confidentiality is low, but integrity and availability impacts are high, as attackers can manipulate device behavior or disrupt charging services. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved and published in June 2025, indicating it is a recent discovery.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for entities relying on EVLink WallBox charging stations in their infrastructure, such as corporate campuses, public charging networks, and municipal facilities. Successful exploitation could allow attackers to disrupt electric vehicle charging services, potentially causing operational downtime and impacting business continuity. Furthermore, remote control over charging stations could be leveraged to create safety hazards or be used as a foothold for lateral movement within organizational networks if the devices are connected to internal systems. Given the growing adoption of electric vehicles and associated infrastructure in Europe, this vulnerability poses a risk to critical energy and transportation sectors. The requirement for authenticated access somewhat limits the attack surface but does not eliminate risk, as credential compromise or insider threats could enable exploitation. Additionally, the lack of patches increases exposure time, emphasizing the urgency for mitigation.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the EVLink WallBox web server interface to trusted personnel only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication mechanisms and credential management policies to reduce the risk of unauthorized access. 3. Monitor logs and network traffic for unusual activities indicative of command injection attempts or unauthorized configuration changes. 4. Until an official patch is released, consider disabling remote configuration capabilities if feasible or deploying compensating controls such as Web Application Firewalls (WAFs) with custom rules to detect and block command injection patterns. 5. Engage with Schneider Electric support channels to obtain information on forthcoming patches or firmware updates and plan timely deployment. 6. Conduct security awareness training for administrators managing these devices to recognize and prevent misuse of credentials and configuration interfaces. 7. Implement regular vulnerability scanning and penetration testing focused on EV charging infrastructure to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
schneider
Date Reserved
2025-06-05T15:26:11.512Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68487f591b0bd07c3938aa42

Added to database: 6/10/2025, 6:54:17 PM

Last enriched: 7/11/2025, 2:16:16 AM

Last updated: 8/4/2025, 8:14:55 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats