CVE-2025-5822
📋 TL;DR
This vulnerability allows remote attackers with low-privileged authorization tokens to escalate privileges on Autel MaxiCharger AC Wallbox Commercial charging stations. Attackers can access protected resources normally restricted from their user level. Organizations using these charging stations with the Technician API enabled are affected.
💻 Affected Systems
- Autel MaxiCharger AC Wallbox Commercial
📦 What is this software?
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of charging station management, allowing attackers to disable charging, manipulate billing, access customer data, or potentially cause physical damage through improper charging parameters.
Likely Case
Unauthorized access to administrative functions, configuration changes, user data exposure, and potential disruption of charging services.
If Mitigated
Limited impact if proper network segmentation, API access controls, and monitoring are in place to detect and block unauthorized privilege escalation attempts.
🎯 Exploit Status
Requires obtaining a low-privileged authorization token first, then exploiting incorrect authorization checks in the Technician API.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-340/
Restart Required: Yes
Instructions:
1. Contact Autel support for firmware updates. 2. Download latest firmware from Autel portal. 3. Apply firmware update following manufacturer instructions. 4. Restart charging station. 5. Verify API authorization controls are functioning correctly.
🔧 Temporary Workarounds
Network Segmentation
allIsolate charging stations on separate VLANs with strict firewall rules limiting API access to authorized management systems only.
API Access Restriction
allDisable Technician API if not required, or restrict access to specific IP addresses using firewall rules.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate charging stations from untrusted networks
- Deploy API gateway with proper authorization validation and rate limiting
🔍 How to Verify
Check if Vulnerable:
Check if Technician API is accessible and test authorization bypass using low-privilege tokens against protected endpoints.
Check Version:
Check firmware version through charging station web interface or management console
Verify Fix Applied:
After patching, test that low-privilege tokens cannot access administrative functions through the Technician API.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized API access attempts
- Privilege escalation patterns in API logs
- Multiple failed authorization attempts followed by successful administrative access
Network Indicators:
- Unusual API traffic patterns
- Administrative API calls from non-admin user accounts
- Traffic to Technician API endpoints from unexpected sources
SIEM Query:
source="charging_station" AND (event_type="api_access" AND user_role="low_privilege" AND endpoint="admin_*")