CVE-2025-5517
📋 TL;DR
A heap-based buffer overflow vulnerability in ABB Terra AC wallbox charging stations allows attackers to execute arbitrary code or cause denial of service by sending specially crafted data to affected devices. This affects multiple ABB Terra AC wallbox models running vulnerable firmware versions. The vulnerability could allow attackers to take control of charging stations or disrupt charging operations.
💻 Affected Systems
- ABB Terra AC wallbox (UL40/80A)
- ABB Terra AC wallbox (UL32A)
- ABB Terra AC wallbox (MID/ CE) -Terra AC MID
- ABB Terra AC wallbox (MID/ CE) -Terra AC Juno CE
- ABB Terra AC wallbox (MID/ CE) -Terra AC PTB
- ABB Terra AC wallbox (JP)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, allowing attackers to manipulate charging operations, steal user data, or use the device as a foothold into the network.
Likely Case
Denial of service causing charging stations to become unresponsive or crash, disrupting electric vehicle charging services.
If Mitigated
Limited impact if devices are behind firewalls with strict network segmentation and access controls.
🎯 Exploit Status
Exploitation requires sending specially crafted data to the device. While no public exploit exists, heap-based buffer overflows are commonly exploitable by skilled attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions above those listed in affected versions (check vendor advisory for specific patched versions)
Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A8948&LanguageCode=en&DocumentPartId=PDF&Action=Launch
Restart Required: No
Instructions:
1. Download the latest firmware from ABB's official website. 2. Follow ABB's firmware update procedure for your specific wallbox model. 3. Verify the firmware version after update. 4. Test charging functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate charging stations on separate network segments with strict firewall rules.
Access Control Lists
allImplement network ACLs to restrict access to charging station management interfaces.
🧯 If You Can't Patch
- Disconnect vulnerable devices from networks until patched
- Implement physical security controls to prevent unauthorized access
🔍 How to Verify
Check if Vulnerable:
Check the firmware version on your ABB Terra AC wallbox via the device's management interface or physical display.
Check Version:
Check via device management interface - specific command varies by model
Verify Fix Applied:
Confirm firmware version is above the vulnerable ranges listed in the affected systems section.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Memory allocation errors in system logs
- Unusual network traffic patterns to charging stations
Network Indicators:
- Unusual traffic spikes to charging station ports
- Malformed packets sent to charging station management interfaces
SIEM Query:
source="charging_station" AND (event_type="crash" OR event_type="memory_error" OR bytes_received>threshold)