CVE-2025-5517

6.8 MEDIUM

📋 TL;DR

A heap-based buffer overflow vulnerability in ABB Terra AC wallbox charging stations allows attackers to execute arbitrary code or cause denial of service by sending specially crafted data to affected devices. This affects multiple ABB Terra AC wallbox models running vulnerable firmware versions. The vulnerability could allow attackers to take control of charging stations or disrupt charging operations.

💻 Affected Systems

Products:
  • ABB Terra AC wallbox (UL40/80A)
  • ABB Terra AC wallbox (UL32A)
  • ABB Terra AC wallbox (MID/ CE) -Terra AC MID
  • ABB Terra AC wallbox (MID/ CE) -Terra AC Juno CE
  • ABB Terra AC wallbox (MID/ CE) -Terra AC PTB
  • ABB Terra AC wallbox (JP)
Versions: Terra AC wallbox (UL40/80A): through 1.8.32; Terra AC wallbox (UL32A): through 1.8.2; Terra AC wallbox (MID/ CE) -Terra AC MID: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC Juno CE: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC PTB: through 1.8.21; Terra AC wallbox (JP): through 1.8.2
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models running vulnerable firmware versions are vulnerable by default. No special configuration is required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, allowing attackers to manipulate charging operations, steal user data, or use the device as a foothold into the network.

🟠

Likely Case

Denial of service causing charging stations to become unresponsive or crash, disrupting electric vehicle charging services.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - If devices are directly exposed to the internet, they can be remotely exploited without authentication.
🏢 Internal Only: MEDIUM - Internal network access still presents risk, but requires attacker to breach perimeter defenses first.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending specially crafted data to the device. While no public exploit exists, heap-based buffer overflows are commonly exploitable by skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above those listed in affected versions (check vendor advisory for specific patched versions)

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A8948&LanguageCode=en&DocumentPartId=PDF&Action=Launch

Restart Required: No

Instructions:

1. Download the latest firmware from ABB's official website. 2. Follow ABB's firmware update procedure for your specific wallbox model. 3. Verify the firmware version after update. 4. Test charging functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charging stations on separate network segments with strict firewall rules.

Access Control Lists

all

Implement network ACLs to restrict access to charging station management interfaces.

🧯 If You Can't Patch

  • Disconnect vulnerable devices from networks until patched
  • Implement physical security controls to prevent unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check the firmware version on your ABB Terra AC wallbox via the device's management interface or physical display.

Check Version:

Check via device management interface - specific command varies by model

Verify Fix Applied:

Confirm firmware version is above the vulnerable ranges listed in the affected systems section.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Memory allocation errors in system logs
  • Unusual network traffic patterns to charging stations

Network Indicators:

  • Unusual traffic spikes to charging station ports
  • Malformed packets sent to charging station management interfaces

SIEM Query:

source="charging_station" AND (event_type="crash" OR event_type="memory_error" OR bytes_received>threshold)

🔗 References

📤 Share & Export