Skip to main content

CVE-2025-5828: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autel Autel MaxiCharger AC Wallbox Commercial

Medium
VulnerabilityCVE-2025-5828cvecve-2025-5828cwe-120
Published: Wed Jun 25 2025 (06/25/2025, 18:00:44 UTC)
Source: CVE Database V5
Vendor/Project: Autel
Product: Autel MaxiCharger AC Wallbox Commercial

Description

Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:43:24 UTC

Technical Analysis

CVE-2025-5828 is a buffer overflow vulnerability classified under CWE-120 that affects the Autel MaxiCharger AC Wallbox Commercial electric vehicle (EV) chargers, specifically version 1.36.00. The flaw arises from improper validation of the length of user-supplied data within USB frame packets before copying it into a fixed-length buffer. This classic buffer overflow allows an attacker who has physical access to the device to execute arbitrary code remotely without requiring any authentication or user interaction. The vulnerability is rooted in the device's firmware handling of USB communication, where the lack of bounds checking on input data leads to memory corruption. Exploiting this vulnerability enables an attacker to run code with the privileges of the device, potentially compromising the charger’s operational integrity and enabling further attacks on connected infrastructure. Although no public exploits have been observed in the wild, the vulnerability has been assigned a CVSS 3.0 base score of 6.8, indicating a medium severity level. The attack vector is physical (AV:P), meaning the attacker must be physically present to connect to the USB interface. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could lead to data leakage, device manipulation, or denial of service. The flaw was reported by the Zero Day Initiative (ZDI) under identifier ZDI-CAN-26328 and was published on June 25, 2025. No patches or mitigations have been officially released at the time of this analysis.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, particularly for entities operating EV charging infrastructure using the affected Autel MaxiCharger AC Wallbox Commercial units. Successful exploitation could allow attackers to disrupt charging services, manipulate billing data, or use compromised chargers as pivot points to infiltrate broader operational technology (OT) or IT networks. This could affect utilities, commercial parking operators, and public charging networks, potentially causing service outages and financial losses. Additionally, compromised chargers could undermine trust in EV infrastructure security, slowing EV adoption. Given the physical access requirement, the threat is more pronounced in publicly accessible or poorly secured charging stations. The vulnerability also raises safety concerns, as malicious code execution could interfere with the device’s power delivery mechanisms. The medium CVSS score reflects the balance between the high impact of exploitation and the limited attack vector. However, the absence of authentication and user interaction requirements increases risk in environments where physical security is lax.

Mitigation Recommendations

1. Implement strict physical security controls around EV charging stations to prevent unauthorized physical access, including surveillance, access restrictions, and tamper-evident seals. 2. Monitor USB ports on chargers for unauthorized connections using hardware or software-based port control solutions. 3. Network segmentation should isolate EV chargers from critical IT and OT systems to limit lateral movement in case of compromise. 4. Employ anomaly detection systems to identify unusual device behavior indicative of exploitation attempts. 5. Coordinate with Autel for timely firmware updates or patches; if unavailable, consider temporary operational measures such as disabling USB interfaces where feasible. 6. Conduct regular security audits and penetration tests focusing on physical attack vectors and device firmware vulnerabilities. 7. Educate personnel responsible for charger maintenance on recognizing signs of tampering and the importance of reporting suspicious activity promptly. 8. Explore deployment of endpoint protection solutions tailored for embedded devices if supported by the charger platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-06T19:17:04.853Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 685c3f5ae230f5b23485597e

Added to database: 6/25/2025, 6:26:34 PM

Last enriched: 6/25/2025, 6:43:24 PM

Last updated: 8/18/2025, 11:30:28 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats