CVE-2025-5749: CWE-457: Use of Uninitialized Variable in WOLFBOX Level 2 EV Charger
WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295.
AI Analysis
Technical Summary
CVE-2025-5749 is a medium-severity vulnerability identified in the WOLFBOX Level 2 Electric Vehicle (EV) Charger, specifically affecting firmware versions 3.1.17 (main) and 1.2.6 (MCU). The vulnerability stems from a CWE-457 issue, which is the use of an uninitialized variable related to the handling of Bluetooth Low Energy (BLE) encryption keys. In this context, the cryptographic keys used for vendor-specific encrypted communications are not properly initialized before use. This flaw allows a network-adjacent attacker to bypass authentication mechanisms without requiring any prior authentication or user interaction. The vulnerability effectively compromises the integrity of the authentication process, enabling unauthorized access to the charger’s control interface or communication channels. Exploitation could allow attackers to manipulate charging sessions, disrupt service availability, or potentially pivot to other connected systems if the charger is integrated into broader smart grid or building management networks. Although no known exploits are currently reported in the wild, the vulnerability’s presence in a critical infrastructure component like EV chargers raises concerns about potential future exploitation. The CVSS 3.0 score of 6.3 reflects a medium severity, considering the attack vector is adjacent network access, low attack complexity, no privileges required, and no user interaction needed, with limited confidentiality, integrity, and availability impacts.
Potential Impact
For European organizations, the impact of this vulnerability could be significant given the increasing adoption of EV infrastructure across the continent. Unauthorized access to EV chargers could lead to disruptions in charging availability, affecting fleet operations, public charging stations, and private installations. This could result in operational downtime, financial losses, and reputational damage, especially for service providers and municipalities relying on these chargers. Furthermore, compromised chargers could be leveraged as entry points into corporate or municipal networks, potentially exposing sensitive data or enabling lateral movement. The confidentiality impact is limited but not negligible, as attackers might intercept or manipulate encrypted communications. Integrity and availability impacts are more pronounced, with the possibility of unauthorized control or denial of service. Given the strategic push for green energy and EV adoption in Europe, ensuring the security of charging infrastructure is critical to maintaining trust and operational continuity.
Mitigation Recommendations
To mitigate this vulnerability, European organizations using WOLFBOX Level 2 EV Chargers should prioritize the following actions: 1) Apply firmware updates as soon as they become available from WOLFBOX, even though no patches are currently listed, maintain close communication with the vendor for timely releases. 2) Implement network segmentation to isolate EV chargers from critical IT and OT networks, limiting the potential for lateral movement if a charger is compromised. 3) Employ network-level access controls such as firewalls and BLE signal filtering to restrict access to authorized devices only. 4) Monitor network traffic for anomalous BLE communication patterns that could indicate exploitation attempts. 5) Conduct regular security assessments and penetration testing on EV charging infrastructure to identify and remediate weaknesses proactively. 6) Engage with vendors to ensure secure key management practices and request transparency on cryptographic implementations. 7) Consider deploying additional authentication layers or VPN tunnels for remote management interfaces to compensate for the authentication bypass risk.
Affected Countries
Germany, France, Netherlands, United Kingdom, Norway, Sweden, Belgium
CVE-2025-5749: CWE-457: Use of Uninitialized Variable in WOLFBOX Level 2 EV Charger
Description
WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295.
AI-Powered Analysis
Technical Analysis
CVE-2025-5749 is a medium-severity vulnerability identified in the WOLFBOX Level 2 Electric Vehicle (EV) Charger, specifically affecting firmware versions 3.1.17 (main) and 1.2.6 (MCU). The vulnerability stems from a CWE-457 issue, which is the use of an uninitialized variable related to the handling of Bluetooth Low Energy (BLE) encryption keys. In this context, the cryptographic keys used for vendor-specific encrypted communications are not properly initialized before use. This flaw allows a network-adjacent attacker to bypass authentication mechanisms without requiring any prior authentication or user interaction. The vulnerability effectively compromises the integrity of the authentication process, enabling unauthorized access to the charger’s control interface or communication channels. Exploitation could allow attackers to manipulate charging sessions, disrupt service availability, or potentially pivot to other connected systems if the charger is integrated into broader smart grid or building management networks. Although no known exploits are currently reported in the wild, the vulnerability’s presence in a critical infrastructure component like EV chargers raises concerns about potential future exploitation. The CVSS 3.0 score of 6.3 reflects a medium severity, considering the attack vector is adjacent network access, low attack complexity, no privileges required, and no user interaction needed, with limited confidentiality, integrity, and availability impacts.
Potential Impact
For European organizations, the impact of this vulnerability could be significant given the increasing adoption of EV infrastructure across the continent. Unauthorized access to EV chargers could lead to disruptions in charging availability, affecting fleet operations, public charging stations, and private installations. This could result in operational downtime, financial losses, and reputational damage, especially for service providers and municipalities relying on these chargers. Furthermore, compromised chargers could be leveraged as entry points into corporate or municipal networks, potentially exposing sensitive data or enabling lateral movement. The confidentiality impact is limited but not negligible, as attackers might intercept or manipulate encrypted communications. Integrity and availability impacts are more pronounced, with the possibility of unauthorized control or denial of service. Given the strategic push for green energy and EV adoption in Europe, ensuring the security of charging infrastructure is critical to maintaining trust and operational continuity.
Mitigation Recommendations
To mitigate this vulnerability, European organizations using WOLFBOX Level 2 EV Chargers should prioritize the following actions: 1) Apply firmware updates as soon as they become available from WOLFBOX, even though no patches are currently listed, maintain close communication with the vendor for timely releases. 2) Implement network segmentation to isolate EV chargers from critical IT and OT networks, limiting the potential for lateral movement if a charger is compromised. 3) Employ network-level access controls such as firewalls and BLE signal filtering to restrict access to authorized devices only. 4) Monitor network traffic for anomalous BLE communication patterns that could indicate exploitation attempts. 5) Conduct regular security assessments and penetration testing on EV charging infrastructure to identify and remediate weaknesses proactively. 6) Engage with vendors to ensure secure key management practices and request transparency on cryptographic implementations. 7) Consider deploying additional authentication layers or VPN tunnels for remote management interfaces to compensate for the authentication bypass risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-06-05T20:45:30.134Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68430d3871f4d251b5cfea81
Added to database: 6/6/2025, 3:46:00 PM
Last enriched: 7/8/2025, 3:58:30 AM
Last updated: 8/6/2025, 10:05:00 PM
Views: 15
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.