CVE-2025-5749

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers within Bluetooth range to bypass authentication on WOLFBOX Level 2 EV Chargers by exploiting uninitialized encryption key variables. The flaw enables unauthorized access to charger control functions without valid credentials. Only WOLFBOX Level 2 EV Charger devices with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • WOLFBOX Level 2 EV Charger
Versions: Specific firmware versions not specified in advisory
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations appear vulnerable. Requires Bluetooth proximity (typically within 10 meters).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could remotely control charging functions, modify charging parameters, disable safety features, or potentially cause electrical hazards by manipulating the charger's operation.

🟠

Likely Case

Unauthorized users could start/stop charging sessions, view charging data, or modify charging schedules without authentication, potentially causing billing issues or service disruption.

🟢

If Mitigated

With proper network segmentation and physical security, impact is limited to local Bluetooth range with no remote exploitation possible.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires Bluetooth access and understanding of vendor-specific BLE protocol. No authentication needed as stated in CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Contact WOLFBOX vendor for firmware updates 2. Download updated firmware 3. Apply firmware update via manufacturer's recommended method 4. Restart charger to apply changes

🔧 Temporary Workarounds

Disable Bluetooth when not in use

all

Turn off Bluetooth functionality on the charger when not actively pairing with authorized devices

Vendor-specific command not available

Physical access restriction

all

Restrict physical access to charger installation area to prevent attackers from getting within Bluetooth range

🧯 If You Can't Patch

  • Deploy chargers in physically secure locations with limited public access
  • Implement network segmentation to isolate chargers from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check firmware version against vendor's vulnerability list. Test Bluetooth authentication bypass using ZDI-CAN-26295 methodology.

Check Version:

Vendor-specific command not documented. Check device display or mobile app for firmware version.

Verify Fix Applied:

Verify firmware version matches patched version from vendor. Test authentication requirements via Bluetooth connection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts via Bluetooth
  • Successful authentication from unknown MAC addresses
  • Configuration changes without authorized user activity

Network Indicators:

  • Unusual Bluetooth connection patterns
  • BLE traffic from unexpected locations
  • Protocol anomalies in vendor-specific BLE communications

SIEM Query:

Not applicable - primarily local Bluetooth attack vector

🔗 References

📤 Share & Export