CVE-2025-5829
📋 TL;DR
This vulnerability allows physically present attackers to execute arbitrary code on Autel MaxiCharger AC Wallbox Commercial EV chargers by exploiting a stack-based buffer overflow in JSON message handling. No authentication is required, enabling attackers with physical access to potentially take full control of affected charging stations.
💻 Affected Systems
- Autel MaxiCharger AC Wallbox Commercial EV Chargers
📦 What is this software?
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attacker to disable charging functionality, manipulate billing data, access connected vehicle data, or use the device as a foothold into connected networks.
Likely Case
Device disruption causing charging service outages, potential data theft from connected vehicles, or installation of persistent malware on charging infrastructure.
If Mitigated
Limited impact if devices are physically secured and network-isolated, though buffer overflow could still cause device crashes.
🎯 Exploit Status
Exploitation requires physical access to the charging station and knowledge of the JSON message structure. No authentication bypass needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified
Vendor Advisory: Not provided in available references
Restart Required: No
Instructions:
1. Monitor Autel security advisories for patch availability
2. Apply firmware updates when released
3. Follow vendor's specific update procedures for EV charging equipment
🔧 Temporary Workarounds
Physical Access Restriction
allRestrict physical access to charging stations to authorized personnel only
Network Segmentation
allIsolate EV charging stations on separate network segments with strict firewall rules
🧯 If You Can't Patch
- Implement strict physical security controls around charging stations
- Deploy network monitoring for unusual traffic patterns from charging stations
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vendor's vulnerability list when available
Check Version:
Check through device management interface or physical display - specific command not provided
Verify Fix Applied:
Verify firmware version has been updated to patched version specified by vendor
📡 Detection & Monitoring
Log Indicators:
- Multiple failed JSON parsing attempts
- Device crash/restart events
- Unusual network traffic from charging station
Network Indicators:
- Unusual JSON payloads to charging station management ports
- Traffic patterns indicating buffer overflow attempts
SIEM Query:
source="ev_charger" AND (event_type="crash" OR event_type="buffer_overflow" OR json_parse_errors > threshold)