Heap-based Buffer Overflow in WOLFBOX Level 2 EV Charger by WOLFBOX
CVE-2025-5750
What is CVE-2025-5750?
The WOLFBOX Level 2 EV Charger is susceptible to a heap-based buffer overflow vulnerability caused by improper parameter validation. Attackers on the same network can exploit this flaw to execute arbitrary code on affected devices, with no authentication required. The vulnerability arises during the handling of secKey, localKey, stdTimeZone, and devId parameters, where the system fails to adequately check the length of input data before copying it to a fixed-length heap-based buffer. This oversight opens the door for malicious exploitation, emphasizing the need for immediate security assessments and patching.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Level 2 EV Charger 3.1.17 (main), 1.2.6 (MCU)
References
CVSS V3.0
Timeline
Vulnerability published
Vulnerability Reserved
