CVE-2026-21635: Vulnerability in Ubiquiti Inc UniFi Connect EV Station Lite
An Improper Access Control could allow a malicious actor in Wi-Fi range to the EV Station Lite (v1.5.2 and earlier) to use WiFi AutoLink feature on a device that was only adopted via Ethernet.
AI Analysis
Technical Summary
CVE-2026-21635 is an improper access control vulnerability found in Ubiquiti Inc's UniFi Connect EV Station Lite, specifically versions 1.5.2 and earlier. The vulnerability arises from the WiFi AutoLink feature, which is intended to facilitate device connectivity. However, a malicious actor within Wi-Fi range can exploit this feature to gain unauthorized access to a device that was initially adopted via Ethernet, bypassing intended network segmentation controls. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. This means the attack requires adjacent network access (Wi-Fi range), high attack complexity, no privileges or user interaction, and impacts confidentiality but not integrity or availability. The flaw is classified under CWE-284 (Improper Access Control), highlighting a failure to enforce proper permissions. No patches or exploits are currently reported, but the vulnerability could allow attackers to intercept or manipulate sensitive data or configurations on the EV Station Lite device. Given the role of EV charging stations in critical infrastructure and the increasing deployment of IoT devices in energy and transportation sectors, this vulnerability poses a tangible risk to operational security.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to EV charging station devices, potentially exposing sensitive operational data or enabling attackers to manipulate device configurations. This could disrupt EV charging services or compromise user privacy. The confidentiality impact is high, as attackers may intercept or access sensitive information. Although the vulnerability does not affect integrity or availability directly, unauthorized access could be a stepping stone for further attacks on network infrastructure. Organizations operating EV charging infrastructure, especially those using Ubiquiti UniFi Connect EV Station Lite devices, face increased risk of localized attacks from adversaries within Wi-Fi range. This is particularly concerning in public or semi-public charging locations where Wi-Fi access is less controlled. The medium CVSS score reflects moderate risk, but the potential impact on critical infrastructure and user trust elevates the importance of addressing this vulnerability promptly.
Mitigation Recommendations
1. Monitor Ubiquiti's official channels for firmware updates or patches addressing CVE-2026-21635 and apply them immediately upon release. 2. Restrict Wi-Fi access to EV Station Lite devices by implementing strong Wi-Fi network segmentation and access control lists (ACLs) to limit connections only to authorized devices. 3. Disable the WiFi AutoLink feature if it is not essential for operations, reducing the attack surface. 4. Conduct regular security audits and penetration testing on EV charging infrastructure to detect unauthorized access attempts. 5. Deploy network monitoring tools capable of detecting anomalous Wi-Fi activity around EV charging stations. 6. Educate operational staff about the risks of Wi-Fi based attacks and enforce physical security measures to limit attacker proximity. 7. Consider using VPNs or encrypted tunnels for management traffic to the EV Station Lite devices to protect confidentiality. 8. Collaborate with Ubiquiti support for guidance on secure configuration best practices specific to the EV Station Lite product.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden
CVE-2026-21635: Vulnerability in Ubiquiti Inc UniFi Connect EV Station Lite
Description
An Improper Access Control could allow a malicious actor in Wi-Fi range to the EV Station Lite (v1.5.2 and earlier) to use WiFi AutoLink feature on a device that was only adopted via Ethernet.
AI-Powered Analysis
Technical Analysis
CVE-2026-21635 is an improper access control vulnerability found in Ubiquiti Inc's UniFi Connect EV Station Lite, specifically versions 1.5.2 and earlier. The vulnerability arises from the WiFi AutoLink feature, which is intended to facilitate device connectivity. However, a malicious actor within Wi-Fi range can exploit this feature to gain unauthorized access to a device that was initially adopted via Ethernet, bypassing intended network segmentation controls. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. This means the attack requires adjacent network access (Wi-Fi range), high attack complexity, no privileges or user interaction, and impacts confidentiality but not integrity or availability. The flaw is classified under CWE-284 (Improper Access Control), highlighting a failure to enforce proper permissions. No patches or exploits are currently reported, but the vulnerability could allow attackers to intercept or manipulate sensitive data or configurations on the EV Station Lite device. Given the role of EV charging stations in critical infrastructure and the increasing deployment of IoT devices in energy and transportation sectors, this vulnerability poses a tangible risk to operational security.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to EV charging station devices, potentially exposing sensitive operational data or enabling attackers to manipulate device configurations. This could disrupt EV charging services or compromise user privacy. The confidentiality impact is high, as attackers may intercept or access sensitive information. Although the vulnerability does not affect integrity or availability directly, unauthorized access could be a stepping stone for further attacks on network infrastructure. Organizations operating EV charging infrastructure, especially those using Ubiquiti UniFi Connect EV Station Lite devices, face increased risk of localized attacks from adversaries within Wi-Fi range. This is particularly concerning in public or semi-public charging locations where Wi-Fi access is less controlled. The medium CVSS score reflects moderate risk, but the potential impact on critical infrastructure and user trust elevates the importance of addressing this vulnerability promptly.
Mitigation Recommendations
1. Monitor Ubiquiti's official channels for firmware updates or patches addressing CVE-2026-21635 and apply them immediately upon release. 2. Restrict Wi-Fi access to EV Station Lite devices by implementing strong Wi-Fi network segmentation and access control lists (ACLs) to limit connections only to authorized devices. 3. Disable the WiFi AutoLink feature if it is not essential for operations, reducing the attack surface. 4. Conduct regular security audits and penetration testing on EV charging infrastructure to detect unauthorized access attempts. 5. Deploy network monitoring tools capable of detecting anomalous Wi-Fi activity around EV charging stations. 6. Educate operational staff about the risks of Wi-Fi based attacks and enforce physical security measures to limit attacker proximity. 7. Consider using VPNs or encrypted tunnels for management traffic to the EV Station Lite devices to protect confidentiality. 8. Collaborate with Ubiquiti support for guidance on secure configuration best practices specific to the EV Station Lite product.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-01T15:00:02.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bec94b7d62031395509e1
Added to database: 1/5/2026, 4:53:40 PM
Last enriched: 1/12/2026, 9:20:35 PM
Last updated: 2/7/2026, 4:34:05 AM
Views: 299
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.