CVE-2025-5751: CWE-798: Use of Hard-coded Credentials in WOLFBOX Level 2 EV Charger
WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292.
AI Analysis
Technical Summary
CVE-2025-5751 is a vulnerability identified in the WOLFBOX Level 2 Electric Vehicle (EV) Charger, specifically affecting versions 3.1.17 (main) and 1.2.6 (MCU). The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials. In this case, the flaw arises from the management cards used to control the charger. These management cards lack personalization, meaning that the same credentials or authentication tokens are embedded and reused across devices. This design flaw allows an attacker with physical access to the charger to bypass authentication controls without needing any prior authentication or user interaction. The vulnerability does not impact confidentiality but has a significant impact on integrity, as unauthorized users can gain management-level access to the charger. This could allow them to manipulate charging parameters, disrupt charging sessions, or potentially cause damage to the hardware or connected vehicles. The vulnerability requires physical presence, as exploitation involves interaction with the management card system. No known exploits are currently reported in the wild, and no patches have been released yet. The CVSS v3.0 score is 4.6 (medium severity), reflecting the limited attack vector (physical access) but significant impact on system integrity. The vulnerability was published on June 6, 2025, and was assigned by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-26292.
Potential Impact
For European organizations, especially those involved in EV infrastructure, this vulnerability poses a tangible risk. Unauthorized physical access to charging stations could lead to manipulation of charging operations, potentially causing service disruptions or damage to EV batteries and hardware. This could undermine trust in EV infrastructure reliability and safety, impacting public and private charging networks. Critical infrastructure operators, fleet managers, and public charging station providers may face operational disruptions and reputational damage. Furthermore, attackers could leverage compromised chargers as entry points for broader network attacks if the chargers are connected to corporate or utility networks. The lack of authentication requirement lowers the barrier for exploitation, increasing risk in environments where physical security is not tightly controlled. Given the increasing adoption of EVs across Europe, the vulnerability could affect a wide range of stakeholders from municipal operators to private enterprises.
Mitigation Recommendations
Mitigation should focus on both immediate and long-term measures. Immediately, organizations should enforce strict physical security controls around EV charging stations to prevent unauthorized physical access. This includes surveillance, access restrictions, and tamper-evident seals on management card interfaces. Network segmentation is critical; chargers should be isolated from sensitive networks to limit lateral movement if compromised. Monitoring and logging of charger management activities should be implemented to detect anomalous behavior. In the longer term, WOLFBOX should be urged to release firmware updates that eliminate hard-coded credentials by implementing unique, personalized management cards or alternative strong authentication mechanisms. Organizations should plan for timely deployment of such patches once available. Additionally, conducting regular security assessments of EV infrastructure and incorporating security requirements into procurement processes can reduce exposure to similar vulnerabilities.
Affected Countries
Germany, France, Netherlands, Norway, United Kingdom, Sweden
CVE-2025-5751: CWE-798: Use of Hard-coded Credentials in WOLFBOX Level 2 EV Charger
Description
WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292.
AI-Powered Analysis
Technical Analysis
CVE-2025-5751 is a vulnerability identified in the WOLFBOX Level 2 Electric Vehicle (EV) Charger, specifically affecting versions 3.1.17 (main) and 1.2.6 (MCU). The vulnerability is classified under CWE-798, which pertains to the use of hard-coded credentials. In this case, the flaw arises from the management cards used to control the charger. These management cards lack personalization, meaning that the same credentials or authentication tokens are embedded and reused across devices. This design flaw allows an attacker with physical access to the charger to bypass authentication controls without needing any prior authentication or user interaction. The vulnerability does not impact confidentiality but has a significant impact on integrity, as unauthorized users can gain management-level access to the charger. This could allow them to manipulate charging parameters, disrupt charging sessions, or potentially cause damage to the hardware or connected vehicles. The vulnerability requires physical presence, as exploitation involves interaction with the management card system. No known exploits are currently reported in the wild, and no patches have been released yet. The CVSS v3.0 score is 4.6 (medium severity), reflecting the limited attack vector (physical access) but significant impact on system integrity. The vulnerability was published on June 6, 2025, and was assigned by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-26292.
Potential Impact
For European organizations, especially those involved in EV infrastructure, this vulnerability poses a tangible risk. Unauthorized physical access to charging stations could lead to manipulation of charging operations, potentially causing service disruptions or damage to EV batteries and hardware. This could undermine trust in EV infrastructure reliability and safety, impacting public and private charging networks. Critical infrastructure operators, fleet managers, and public charging station providers may face operational disruptions and reputational damage. Furthermore, attackers could leverage compromised chargers as entry points for broader network attacks if the chargers are connected to corporate or utility networks. The lack of authentication requirement lowers the barrier for exploitation, increasing risk in environments where physical security is not tightly controlled. Given the increasing adoption of EVs across Europe, the vulnerability could affect a wide range of stakeholders from municipal operators to private enterprises.
Mitigation Recommendations
Mitigation should focus on both immediate and long-term measures. Immediately, organizations should enforce strict physical security controls around EV charging stations to prevent unauthorized physical access. This includes surveillance, access restrictions, and tamper-evident seals on management card interfaces. Network segmentation is critical; chargers should be isolated from sensitive networks to limit lateral movement if compromised. Monitoring and logging of charger management activities should be implemented to detect anomalous behavior. In the longer term, WOLFBOX should be urged to release firmware updates that eliminate hard-coded credentials by implementing unique, personalized management cards or alternative strong authentication mechanisms. Organizations should plan for timely deployment of such patches once available. Additionally, conducting regular security assessments of EV infrastructure and incorporating security requirements into procurement processes can reduce exposure to similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-06-05T20:45:43.845Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68430d3871f4d251b5cfea87
Added to database: 6/6/2025, 3:46:00 PM
Last enriched: 7/8/2025, 3:58:16 AM
Last updated: 8/12/2025, 6:01:03 AM
Views: 20
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.