CVE-2025-5826
📋 TL;DR
This vulnerability allows attackers within Bluetooth range to send arbitrary AT commands to Autel MaxiCharger AC Wallbox Commercial charging stations without authentication. The flaw exists in how the device processes Bluetooth messages, potentially enabling remote code execution. Affected installations of these commercial EV charging stations are at risk.
💻 Affected Systems
- Autel MaxiCharger AC Wallbox Commercial
📦 What is this software?
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to disable charging, manipulate billing data, cause electrical damage, or use the device as an entry point to the broader network.
Likely Case
Disruption of charging services, unauthorized access to device functions, or collection of sensitive user/vehicle data.
If Mitigated
Limited impact if Bluetooth access is restricted and devices are isolated from critical networks.
🎯 Exploit Status
No authentication required, but requires Bluetooth proximity and knowledge of AT command structure. ZDI-CAN-26368 suggests coordinated disclosure.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not yet released
Vendor Advisory: Not available at time of analysis
Restart Required: Yes
Instructions:
1. Monitor Autel security advisories. 2. Apply firmware update when available. 3. Restart charging stations after update.
🔧 Temporary Workarounds
Disable Bluetooth when not needed
allTurn off Bluetooth functionality on charging stations if not required for normal operation
Physical access control
allRestrict physical access to charging station locations to prevent attackers from getting within Bluetooth range
🧯 If You Can't Patch
- Segment charging station network from critical infrastructure
- Implement physical security controls to limit Bluetooth proximity access
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vendor advisory when available. Currently no public verification method.
Check Version:
Check through device management interface or physical display - specific command not documented
Verify Fix Applied:
Verify firmware version matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth connection attempts
- AT command execution in device logs
- Unexpected device behavior or reboots
Network Indicators:
- Bluetooth traffic to charging stations from unauthorized devices
- Unusual network traffic from charging stations
SIEM Query:
Not applicable - primarily requires physical/Bluetooth monitoring rather than network SIEM