Skip to main content

CVE-2025-5825: CWE-1328: Security Version Number Mutable to Older Versions in Autel Autel MaxiCharger AC Wallbox Commercial

High
VulnerabilityCVE-2025-5825cvecve-2025-5825cwe-1328
Published: Wed Jun 25 2025 (06/25/2025, 18:02:18 UTC)
Source: CVE Database V5
Vendor/Project: Autel
Product: Autel MaxiCharger AC Wallbox Commercial

Description

Autel MaxiCharger AC Wallbox Commercial Firmware Downgrade Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a firmware image before using it to perform an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26354.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:42:26 UTC

Technical Analysis

CVE-2025-5825 is a high-severity vulnerability affecting the Autel MaxiCharger AC Wallbox Commercial electric vehicle charging stations, specifically firmware version 1.36.00. The vulnerability stems from improper validation of firmware images during the update process, allowing an attacker to downgrade the firmware to an older, potentially vulnerable version. This firmware downgrade can be exploited to execute arbitrary code remotely on the device. The attack vector requires the attacker to be network-adjacent and to first pair a malicious Bluetooth device with the target charging station. Once paired, the attacker can leverage the mutable security version number flaw (CWE-1328) to bypass firmware integrity checks and deploy malicious firmware. This flaw compromises the confidentiality, integrity, and availability of the charging station, as arbitrary code execution could lead to unauthorized control, data leakage, or denial of service. The CVSS v3.0 score of 7.5 reflects a high severity, with attack vector classified as adjacent network, high attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently in the wild, the vulnerability presents a significant risk due to the critical role of EV charging infrastructure and the potential for cascading impacts on connected systems and users relying on these stations.

Potential Impact

For European organizations, the impact of this vulnerability is multifaceted. Autel MaxiCharger AC Wallbox Commercial units are deployed in commercial EV charging infrastructure, which is increasingly critical as Europe accelerates its transition to electric mobility. Exploitation could lead to unauthorized remote control of charging stations, potentially disrupting EV charging availability, causing financial losses, and damaging organizational reputation. Furthermore, compromised charging stations could serve as pivot points for lateral movement into corporate or utility networks, threatening broader operational technology (OT) and IT environments. The integrity of firmware updates is crucial for maintaining device security; thus, this vulnerability undermines trust in the supply chain and device lifecycle management. Given the increasing reliance on EV infrastructure in Europe, disruption or manipulation could also have regulatory and compliance implications, especially under frameworks like NIS2 Directive and GDPR if personal or operational data is affected.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately verify the firmware version of all deployed Autel MaxiCharger AC Wallbox Commercial units and restrict network access to these devices, especially Bluetooth pairing capabilities, to trusted personnel and devices only. 2) Employ network segmentation to isolate EV charging infrastructure from critical enterprise and OT networks, minimizing the risk of lateral movement. 3) Monitor Bluetooth pairing logs and network traffic for anomalous pairing attempts or firmware update activities indicative of exploitation attempts. 4) Engage with Autel for firmware updates or patches addressing this vulnerability; if none are currently available, request timelines and interim mitigation guidance. 5) Implement strict physical security controls around charging stations to prevent unauthorized physical access that could facilitate Bluetooth pairing. 6) Incorporate firmware integrity verification mechanisms, such as cryptographic signature validation, into update processes where possible, potentially via third-party security solutions or custom controls. 7) Develop incident response plans specific to EV charging infrastructure compromise scenarios to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-06T19:16:51.065Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 685c3f5ae230f5b23485596f

Added to database: 6/25/2025, 6:26:34 PM

Last enriched: 6/25/2025, 6:42:26 PM

Last updated: 8/13/2025, 8:52:54 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats