Command Injection Vulnerability in Iocharger Firmware for AC Models
CVE-2024-43654
9.3CRITICAL
Key Information:
- Vendor
- Iocharger
- Status
- Iocharger Firmware For Ac Models
- Vendor
- CVE Published:
- 9 January 2025
Summary
The Iocharger AC EV charger firmware contains a command injection vulnerability that allows attackers with low privilege accounts to execute arbitrary commands as root. This vulnerability affects all AC models running firmware versions prior to 25010801. Attackers may exploit this weakness by crafting specific HTTP requests that leverage improper neutralization of special elements. Once exploited, they gain full control over the charging station, enabling them to add, modify, or delete files and services at will. This poses not only security risks but also potential safety hazards due to the nature of the device handling significant power.
Affected Version(s)
Iocharger firmware for AC models 0 < 25010801
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Wilco van Beijnum
Harm van den Brink (DIVD)
Frank Breedijk (DIVD)