CVE-2025-52263

8.0 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers on the same network to upload malicious firmware to Startcharge Artemis AC Chargers, enabling them to execute arbitrary code on the device. This affects organizations using these specific electric vehicle chargers in their infrastructure. Attackers could potentially take full control of the charger hardware.

💻 Affected Systems

Products:
  • Startcharge Artemis AC Charger 7-22 kW
Versions: v1.0.4
Operating Systems: Embedded charger firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network adjacency and authentication. Chargers typically deployed in corporate, commercial, or public charging locations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charger hardware allowing attackers to disable charging, manipulate billing data, use charger as network pivot point, or cause physical damage through electrical manipulation.

🟠

Likely Case

Attackers gain persistent access to charger network, potentially using it to launch further attacks against internal systems or manipulate charging operations.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact limited to isolated charger network segment with no access to critical systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires authenticated access to web configuration interface. Public GitHub repository contains technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Contact Startcharge vendor for firmware update
2. Download latest firmware from vendor portal
3. Upload firmware through web interface
4. Reboot charger after installation

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charger network from critical infrastructure

Access Control

all

Restrict web interface access to authorized administrators only

🧯 If You Can't Patch

  • Segment charger network using VLANs or physical separation
  • Implement strict firewall rules to limit charger communication to only necessary services

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface. Navigate to System > About or similar menu.

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify firmware version has been updated beyond v1.0.4

📡 Detection & Monitoring

Log Indicators:

  • Unusual firmware upload activity
  • Multiple failed authentication attempts followed by successful login
  • Unexpected system reboots

Network Indicators:

  • HTTP POST requests to firmware upload endpoints from unexpected sources
  • Unusual outbound connections from charger

SIEM Query:

source="charger_logs" AND (event="firmware_upload" OR event="system_reboot")

🔗 References

📤 Share & Export