CVE-2020-8007

9.8 CRITICAL

📋 TL;DR

CVE-2020-8007 allows remote attackers to execute arbitrary operating system commands on Circontrol Raption EV charging stations through command injection in three configuration fields. This affects all systems running pwrstudio web application in Raption series through version 5.6.2. Attackers can gain full control of the charging station server.

💻 Affected Systems

Products:
  • Circontrol Raption EV Charging Station
Versions: Through 5.6.2
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the pwrstudio web application configuration menu fields for ntpserver0, ntpserver1, and pingip.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of EV charging infrastructure allowing attackers to execute arbitrary commands, disrupt charging operations, pivot to internal networks, or cause physical damage through electrical manipulation.

🟠

Likely Case

Remote code execution leading to unauthorized access, data theft, service disruption, and potential lateral movement within the charging network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external exploitation, though internal threats remain.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the configuration interface but no special privileges. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6.3 or later

Vendor Advisory: https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/

Restart Required: Yes

Instructions:

1. Contact Circontrol for updated firmware. 2. Backup current configuration. 3. Apply firmware update via management interface. 4. Restart the charging station. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Configuration

all

Implement strict input validation on ntpserver0, ntpserver1, and pingip fields to reject shell metacharacters

# Requires application modification - no direct command

Network Access Restriction

linux

Restrict access to pwrstudio web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport [WEB_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [WEB_PORT] -j DROP

🧯 If You Can't Patch

  • Isolate EV charging stations on separate network segments with strict firewall rules
  • Implement multi-factor authentication and strong access controls for configuration interfaces

🔍 How to Verify

Check if Vulnerable:

Check web interface for version information in pwrstudio application or attempt safe command injection test in configuration fields

Check Version:

Check web interface at /status or /about pages, or use vendor-specific CLI commands if available

Verify Fix Applied:

Verify firmware version is 5.6.3 or later and test that command injection attempts in ntpserver0, ntpserver1, and pingip fields are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts to configuration interface
  • Unexpected configuration changes to NTP or ping settings

Network Indicators:

  • Unusual outbound connections from charging station
  • Traffic to unexpected ports or IP addresses
  • Suspicious payloads in HTTP requests to configuration endpoints

SIEM Query:

source="ev_charger_logs" AND (event="config_change" AND (field="ntpserver*" OR field="pingip")) OR (process="shell" AND parent="pwrstudio")

🔗 References

📤 Share & Export