CVE-2025-5825: CWE-1328: Security Version Number Mutable to Older Versions in Autel Autel MaxiCharger AC Wallbox Commercial
Autel MaxiCharger AC Wallbox Commercial Firmware Downgrade Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a firmware image before using it to perform an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26354.
AI Analysis
Technical Summary
CVE-2025-5825 is a high-severity vulnerability affecting the Autel MaxiCharger AC Wallbox Commercial electric vehicle charging stations, specifically firmware version 1.36.00. The vulnerability stems from improper validation of firmware images during the update process, allowing an attacker to downgrade the firmware to an older, potentially vulnerable version. This firmware downgrade can be exploited to execute arbitrary code remotely on the device. The attack vector requires the attacker to be network-adjacent and to first pair a malicious Bluetooth device with the target charging station. Once paired, the attacker can leverage the mutable security version number flaw (CWE-1328) to bypass firmware integrity checks and deploy malicious firmware. This flaw compromises the confidentiality, integrity, and availability of the charging station, as arbitrary code execution could lead to unauthorized control, data leakage, or denial of service. The CVSS v3.0 score of 7.5 reflects a high severity, with attack vector classified as adjacent network, high attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently in the wild, the vulnerability presents a significant risk due to the critical role of EV charging infrastructure and the potential for cascading impacts on connected systems and users relying on these stations.
Potential Impact
For European organizations, the impact of this vulnerability is multifaceted. Autel MaxiCharger AC Wallbox Commercial units are deployed in commercial EV charging infrastructure, which is increasingly critical as Europe accelerates its transition to electric mobility. Exploitation could lead to unauthorized remote control of charging stations, potentially disrupting EV charging availability, causing financial losses, and damaging organizational reputation. Furthermore, compromised charging stations could serve as pivot points for lateral movement into corporate or utility networks, threatening broader operational technology (OT) and IT environments. The integrity of firmware updates is crucial for maintaining device security; thus, this vulnerability undermines trust in the supply chain and device lifecycle management. Given the increasing reliance on EV infrastructure in Europe, disruption or manipulation could also have regulatory and compliance implications, especially under frameworks like NIS2 Directive and GDPR if personal or operational data is affected.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately verify the firmware version of all deployed Autel MaxiCharger AC Wallbox Commercial units and restrict network access to these devices, especially Bluetooth pairing capabilities, to trusted personnel and devices only. 2) Employ network segmentation to isolate EV charging infrastructure from critical enterprise and OT networks, minimizing the risk of lateral movement. 3) Monitor Bluetooth pairing logs and network traffic for anomalous pairing attempts or firmware update activities indicative of exploitation attempts. 4) Engage with Autel for firmware updates or patches addressing this vulnerability; if none are currently available, request timelines and interim mitigation guidance. 5) Implement strict physical security controls around charging stations to prevent unauthorized physical access that could facilitate Bluetooth pairing. 6) Incorporate firmware integrity verification mechanisms, such as cryptographic signature validation, into update processes where possible, potentially via third-party security solutions or custom controls. 7) Develop incident response plans specific to EV charging infrastructure compromise scenarios to enable rapid containment and remediation.
Affected Countries
Germany, France, Netherlands, Norway, United Kingdom, Sweden, Belgium
CVE-2025-5825: CWE-1328: Security Version Number Mutable to Older Versions in Autel Autel MaxiCharger AC Wallbox Commercial
Description
Autel MaxiCharger AC Wallbox Commercial Firmware Downgrade Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a firmware image before using it to perform an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26354.
AI-Powered Analysis
Technical Analysis
CVE-2025-5825 is a high-severity vulnerability affecting the Autel MaxiCharger AC Wallbox Commercial electric vehicle charging stations, specifically firmware version 1.36.00. The vulnerability stems from improper validation of firmware images during the update process, allowing an attacker to downgrade the firmware to an older, potentially vulnerable version. This firmware downgrade can be exploited to execute arbitrary code remotely on the device. The attack vector requires the attacker to be network-adjacent and to first pair a malicious Bluetooth device with the target charging station. Once paired, the attacker can leverage the mutable security version number flaw (CWE-1328) to bypass firmware integrity checks and deploy malicious firmware. This flaw compromises the confidentiality, integrity, and availability of the charging station, as arbitrary code execution could lead to unauthorized control, data leakage, or denial of service. The CVSS v3.0 score of 7.5 reflects a high severity, with attack vector classified as adjacent network, high attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently in the wild, the vulnerability presents a significant risk due to the critical role of EV charging infrastructure and the potential for cascading impacts on connected systems and users relying on these stations.
Potential Impact
For European organizations, the impact of this vulnerability is multifaceted. Autel MaxiCharger AC Wallbox Commercial units are deployed in commercial EV charging infrastructure, which is increasingly critical as Europe accelerates its transition to electric mobility. Exploitation could lead to unauthorized remote control of charging stations, potentially disrupting EV charging availability, causing financial losses, and damaging organizational reputation. Furthermore, compromised charging stations could serve as pivot points for lateral movement into corporate or utility networks, threatening broader operational technology (OT) and IT environments. The integrity of firmware updates is crucial for maintaining device security; thus, this vulnerability undermines trust in the supply chain and device lifecycle management. Given the increasing reliance on EV infrastructure in Europe, disruption or manipulation could also have regulatory and compliance implications, especially under frameworks like NIS2 Directive and GDPR if personal or operational data is affected.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately verify the firmware version of all deployed Autel MaxiCharger AC Wallbox Commercial units and restrict network access to these devices, especially Bluetooth pairing capabilities, to trusted personnel and devices only. 2) Employ network segmentation to isolate EV charging infrastructure from critical enterprise and OT networks, minimizing the risk of lateral movement. 3) Monitor Bluetooth pairing logs and network traffic for anomalous pairing attempts or firmware update activities indicative of exploitation attempts. 4) Engage with Autel for firmware updates or patches addressing this vulnerability; if none are currently available, request timelines and interim mitigation guidance. 5) Implement strict physical security controls around charging stations to prevent unauthorized physical access that could facilitate Bluetooth pairing. 6) Incorporate firmware integrity verification mechanisms, such as cryptographic signature validation, into update processes where possible, potentially via third-party security solutions or custom controls. 7) Develop incident response plans specific to EV charging infrastructure compromise scenarios to enable rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2025-06-06T19:16:51.065Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 685c3f5ae230f5b23485596f
Added to database: 6/25/2025, 6:26:34 PM
Last enriched: 6/25/2025, 6:42:26 PM
Last updated: 8/13/2025, 8:52:54 AM
Views: 16
Related Threats
CVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumCVE-2025-9101: Cross Site Scripting in zhenfeng13 My-Blog
MediumCVE-2025-9100: Authentication Bypass by Capture-replay in zhenfeng13 My-Blog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.