CVE-2025-5747

8.0 HIGH

📋 TL;DR

This vulnerability allows network-adjacent attackers with authentication to execute arbitrary code on WOLFBOX Level 2 EV Charger devices by exploiting improper command frame parsing in the MCU. The flaw enables remote code execution when combined with other vulnerabilities, potentially compromising charger functionality and security. Only authenticated attackers on the same network can exploit this vulnerability.

💻 Affected Systems

Products:
  • WOLFBOX Level 2 EV Charger
Versions: Specific versions not disclosed in advisory
Operating Systems: Embedded MCU firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network adjacency and authentication. Exact firmware versions affected not specified in available references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to disable charging, manipulate billing data, access connected vehicle networks, or use the charger as an entry point to other network systems.

🟠

Likely Case

Disruption of charging services, unauthorized access to charger settings, or data exfiltration from the device.

🟢

If Mitigated

Limited impact due to authentication requirements and network segmentation, potentially only affecting charger availability.

🌐 Internet-Facing: LOW (requires network adjacency and authentication)
🏢 Internal Only: MEDIUM (requires authentication but could impact critical charging infrastructure)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authentication and network adjacency. The advisory mentions leveraging with other vulnerabilities for RCE.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor vendor website for firmware updates and apply when released.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EV chargers on dedicated network segments with strict access controls

Authentication Hardening

all

Implement strong authentication mechanisms and limit administrative access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate chargers from critical systems
  • Monitor network traffic to/from chargers for anomalous command patterns

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against vendor advisory when available

Check Version:

Check via charger management interface or vendor documentation

Verify Fix Applied:

Verify firmware version matches patched version from vendor when available

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Abnormal command frame patterns
  • MCU error messages

Network Indicators:

  • Malformed network packets to charger management ports
  • Unusual traffic patterns to charger IPs

SIEM Query:

source_ip IN (charger_ips) AND (protocol_anomaly OR auth_failure OR command_parsing_error)

🔗 References

📤 Share & Export