Heap-based Buffer Overflow in WOLFBOX Level 2 EV Charger by WOLFBOX
CVE-2025-5750

8.8HIGH

Key Information:

Vendor

Wolfbox

Vendor
CVE Published:
6 June 2025

What is CVE-2025-5750?

The WOLFBOX Level 2 EV Charger is susceptible to a heap-based buffer overflow vulnerability caused by improper parameter validation. Attackers on the same network can exploit this flaw to execute arbitrary code on affected devices, with no authentication required. The vulnerability arises during the handling of secKey, localKey, stdTimeZone, and devId parameters, where the system fails to adequately check the length of input data before copying it to a fixed-length heap-based buffer. This oversight opens the door for malicious exploitation, emphasizing the need for immediate security assessments and patching.

Affected Version(s)

Level 2 EV Charger 3.1.17 (main), 1.2.6 (MCU)

References

CVSS V3.0

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.