CVE-2024-43649

8.8 HIGH

📋 TL;DR

Authenticated command injection in Iocharger AC charging station firmware allows attackers with low-privilege accounts to execute arbitrary commands as root via manipulated filename parameters. This affects Iocharger AC model firmware versions before 24120701, potentially giving attackers full control over charging stations.

💻 Affected Systems

Products:
  • Iocharger AC charging stations
Versions: All firmware versions before 24120701
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to web interface; low-privilege accounts sufficient.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains root access to charging station, modifies firmware, disables safety systems, pivots to internal networks, and causes physical damage or electrical hazards.

🟠

Likely Case

Attacker compromises charging station to steal credentials, install backdoors, disrupt charging operations, or use as pivot point for network attacks.

🟢

If Mitigated

With network segmentation and strict access controls, impact limited to isolated charging station with no network propagation.

🌐 Internet-Facing: HIGH - Web interface accessible over network with authentication requirement only.
🏢 Internal Only: HIGH - Any network-connected charging station is vulnerable to authenticated attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires reverse engineering or extensive testing to identify vulnerable parameter; authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24120701

Vendor Advisory: https://iocharger.com

Restart Required: No

Instructions:

1. Download firmware version 24120701 from Iocharger website. 2. Log into charging station web interface. 3. Navigate to firmware update section. 4. Upload and apply new firmware. 5. Verify version update.

🔧 Temporary Workarounds

Network segmentation

all

Isolate charging stations on separate VLAN with no internet access and restricted internal connectivity.

Access control hardening

all

Implement strong authentication, disable default accounts, limit user privileges, and monitor authentication logs.

🧯 If You Can't Patch

  • Disable remote web interface access and require physical/local access only
  • Implement strict network firewall rules blocking all unnecessary ports to charging stations

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface admin panel; versions below 24120701 are vulnerable.

Check Version:

Login to web interface and navigate to System Information or Firmware Status page.

Verify Fix Applied:

Confirm firmware version shows 24120701 or higher in admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual filename patterns in web requests
  • Multiple authentication attempts followed by command execution patterns
  • Root privilege escalation in system logs

Network Indicators:

  • Unusual outbound connections from charging stations
  • Command injection patterns in HTTP requests to web interface

SIEM Query:

source="web_logs" AND (url="*<redacted>.exe*" AND filename="*;*" OR filename="*|*" OR filename="*`*" OR filename="*$(*")

🔗 References

📤 Share & Export