Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20882: CWE-307 in Mobiliti e-mobi.hu

0
High
VulnerabilityCVE-2026-20882cvecve-2026-20882cwe-307
Published: Fri Mar 06 2026 (03/06/2026, 15:05:42 UTC)
Source: CVE Database V5
Vendor/Project: Mobiliti
Product: e-mobi.hu

Description

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:24:05 UTC

Technical Analysis

CVE-2026-20882 is a vulnerability identified in the WebSocket API of Mobiliti's e-mobi.hu product, which is used for managing electric vehicle charger telemetry. The core issue is the absence of any rate limiting or restrictions on the number of authentication requests that can be sent via the WebSocket interface. This lack of control allows an attacker to flood the authentication mechanism with excessive requests. Such behavior can lead to denial-of-service (DoS) conditions by overwhelming the system, suppressing, or mis-routing legitimate telemetry data from chargers, which is critical for operational monitoring and management. Additionally, the unrestricted authentication attempts open the door for brute-force attacks, where an attacker systematically tries multiple credentials to gain unauthorized access. The vulnerability is exploitable remotely without requiring prior authentication or user interaction, increasing its risk profile. Although no public exploits have been reported yet, the vulnerability's characteristics and the critical role of charger telemetry in electric vehicle infrastructure make it a significant threat. The CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates a high severity primarily due to the impact on availability, ease of exploitation, and the lack of prerequisites for an attacker. The vulnerability is present in all versions of the product, emphasizing the need for immediate attention from affected organizations. The CWE-307 classification highlights the failure to implement proper authentication rate limiting controls, a common security oversight that can have severe operational consequences in IoT and critical infrastructure contexts.

Potential Impact

The primary impact of CVE-2026-20882 is on the availability of the Mobiliti e-mobi.hu system, specifically the telemetry data from electric vehicle chargers. Disruption or suppression of this data can impair real-time monitoring, diagnostics, and management of charging infrastructure, potentially leading to operational outages or degraded service quality. For organizations managing large fleets of EV chargers, this could translate into significant downtime, customer dissatisfaction, and financial losses. The possibility of brute-force attacks also raises concerns about unauthorized access, which could lead to further manipulation or control of charging stations, data breaches, or sabotage. Given the increasing reliance on electric vehicle infrastructure globally, such disruptions could have cascading effects on energy management and transportation services. The ease of remote exploitation without authentication or user interaction increases the threat surface, making it accessible to a wide range of attackers, including opportunistic threat actors. While no exploits are currently known in the wild, the vulnerability's characteristics suggest it could be weaponized in targeted attacks or widespread campaigns, especially in regions with dense EV infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-20882, organizations should implement strict rate limiting on all authentication requests over the WebSocket API to prevent abuse through excessive attempts. This can be achieved by configuring network-level controls such as firewalls or API gateways to throttle requests per IP or user session. Additionally, deploying anomaly detection systems to monitor unusual authentication patterns can help identify and block brute-force or DoS attempts early. Strengthening authentication mechanisms by enforcing multi-factor authentication (MFA) where possible will reduce the risk of unauthorized access. Regularly updating and patching the e-mobi.hu product is critical, and although no patches are currently listed, organizations should maintain close communication with Mobiliti for any forthcoming fixes. Network segmentation and isolating the telemetry infrastructure from public networks can limit exposure. Implementing robust logging and alerting on authentication failures will aid in rapid incident response. Finally, conducting penetration testing and security assessments focused on WebSocket interfaces can uncover similar weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-24T00:30:38.944Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aaf339c48b3f10ffa20e1c

Added to database: 3/6/2026, 3:31:05 PM

Last enriched: 3/13/2026, 7:24:05 PM

Last updated: 4/21/2026, 6:40:10 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses