CVE-2025-52264

8.0 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on StarCharge Artemis AC Chargers by exploiting a stack overflow in the download.cgi component. Attackers can potentially take full control of affected charging stations. This affects all users of StarCharge Artemis AC Charger 7-22 kW version 1.0.4.

💻 Affected Systems

Products:
  • StarCharge Artemis AC Charger 7-22 kW
Versions: v1.0.4
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface component and is accessible via network requests to the download.cgi endpoint.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the charging station allowing attackers to disable charging, manipulate billing data, or use the device as a foothold into connected networks.

🟠

Likely Case

Remote code execution leading to service disruption, data theft, or unauthorized access to the charging management system.

🟢

If Mitigated

Limited impact if the device is behind proper network segmentation and access controls, though the vulnerability remains exploitable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a CGI script which typically runs with web server privileges, making exploitation straightforward once the overflow is triggered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Contact StarCharge support for patch availability. 2. If patch is available, download from official vendor portal. 3. Apply patch following vendor instructions. 4. Restart the charging station.

🔧 Temporary Workarounds

Network Access Restriction

linux

Block external access to the charging station's web interface

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

CGI Script Disable

linux

Disable or remove the vulnerable download.cgi script

mv /path/to/download.cgi /path/to/download.cgi.disabled

🧯 If You Can't Patch

  • Isolate charging stations on a separate VLAN with strict firewall rules
  • Implement network monitoring for unusual traffic patterns to/from charging stations

🔍 How to Verify

Check if Vulnerable:

Check web interface version at http://<charger-ip>/status or similar endpoint

Check Version:

curl -s http://<charger-ip>/version | grep -i version

Verify Fix Applied:

Verify version is no longer 1.0.4 and test download.cgi endpoint is no longer accessible

📡 Detection & Monitoring

Log Indicators:

  • Multiple large POST requests to download.cgi
  • Unusual process execution from web server user

Network Indicators:

  • HTTP requests with oversized parameters to download.cgi
  • Unexpected outbound connections from charging station

SIEM Query:

source="web_logs" AND uri="/download.cgi" AND (bytes_sent>10000 OR status_code=500)

🔗 References

📤 Share & Export