Heap-based Buffer Overflow in WOLFBOX Level 2 EV Charger by WOLFBOX
CVE-2025-5750
8.8HIGH
What is CVE-2025-5750?
The WOLFBOX Level 2 EV Charger is susceptible to a heap-based buffer overflow vulnerability caused by improper parameter validation. Attackers on the same network can exploit this flaw to execute arbitrary code on affected devices, with no authentication required. The vulnerability arises during the handling of secKey, localKey, stdTimeZone, and devId parameters, where the system fails to adequately check the length of input data before copying it to a fixed-length heap-based buffer. This oversight opens the door for malicious exploitation, emphasizing the need for immediate security assessments and patching.
Affected Version(s)
Level 2 EV Charger 3.1.17 (main), 1.2.6 (MCU)
