Remote Code Execution Vulnerability in WOLFBOX Level 2 EV Charger by WOLFBOX
CVE-2025-5747

8HIGH

Key Information:

Vendor

Wolfbox

Vendor
CVE Published:
6 June 2025

What is CVE-2025-5747?

The vulnerability affects WOLFBOX Level 2 EV Charger devices, allowing network-adjacent attackers to exploit weaknesses in the command frame handling by the microcontroller unit (MCU). The flaw arises from improper detection of the start of command frames, which leads to potential misinterpretation of input. Successful exploitation may enable an attacker to execute arbitrary code in the device's context, thereby compromising its operation. Authentication is required for exploitation, emphasizing the need for secure access controls to protect against these potential threats.

Affected Version(s)

Level 2 EV Charger 3.1.17 (main), 1.2.6 (MCU)

References

CVSS V3.0

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.