Authentication Bypass Vulnerability in WOLFBOX Level 2 EV Charger Management Card
CVE-2025-5751
What is CVE-2025-5751?
CVE-2025-5751 is a significant vulnerability concerning the WOLFBOX Level 2 Electric Vehicle (EV) Charger Management Card, a component pivotal for managing EV charging stations. This vulnerability arises from hard-coded credentials that enable attackers with physical access to bypass authentication protocols on affected devices. Since authentication is not required for exploitation, this flaw creates an opportunity for unauthorized users to gain control over the charger management system, potentially leading to serious security breaches. The ability to manipulate charger settings or access sensitive information raises critical concerns for organizations relying on these systems for electric vehicle charging infrastructures.
Potential impact of CVE-2025-5751
-
Unauthorized Access: The primary risk is that attackers can gain unauthorized control over the EV charging management systems, allowing them to manipulate charging operations or divert resources.
-
System Integrity Compromise: Exploitation of this vulnerability can lead to a complete compromise of system integrity, paving the way for potential data breaches involving sensitive operational data related to the users of the charging infrastructure.
-
Operational Disruption: Should attackers choose to disrupt operations, this vulnerability can be leveraged to halt the charging services, leading to significant operational and financial repercussions for organizations depending on these systems for electric vehicle support.
Affected Version(s)
Level 2 EV Charger 3.1.17 (main), 1.2.6 (MCU)
References
CVSS V3.1
CVSS V3.0
Timeline
Vulnerability published
Vulnerability Reserved
