CVE-2025-6678
📋 TL;DR
This vulnerability allows remote attackers to access sensitive information from Autel MaxiCharger AC Wallbox Commercial charging stations without authentication. The flaw exists in the Pile API, enabling credential disclosure that could lead to further system compromise. All installations using affected versions are vulnerable.
💻 Affected Systems
- Autel MaxiCharger AC Wallbox Commercial
📦 What is this software?
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Ac Elite Business C50 Firmware by Autel
View all CVEs affecting Maxicharger Ac Elite Business C50 Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Mobile Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Mobile Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
Maxicharger Dc Compact Pedestal Firmware by Autel
View all CVEs affecting Maxicharger Dc Compact Pedestal Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative credentials, take full control of charging stations, manipulate charging operations, access connected networks, or cause physical damage through electrical manipulation.
Likely Case
Attackers harvest credentials and sensitive configuration data, potentially enabling unauthorized charging, billing fraud, or lateral movement to other systems.
If Mitigated
With proper network segmentation and monitoring, impact is limited to credential exposure requiring rotation and potential charging station configuration changes.
🎯 Exploit Status
No authentication required makes exploitation trivial; attackers only need network access to the charging station's API endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-342/
Restart Required: Yes
Instructions:
1. Contact Autel for firmware update addressing CVE-2025-6678
2. Download latest firmware from Autel support portal
3. Apply firmware update following manufacturer instructions
4. Restart charging station to activate fixes
🔧 Temporary Workarounds
Network Segmentation
allIsolate charging stations from untrusted networks and internet access
Firewall Rules
allRestrict access to charging station management interfaces to authorized IPs only
🧯 If You Can't Patch
- Segment charging stations on dedicated VLAN with strict firewall rules
- Implement network monitoring for unusual API access patterns
🔍 How to Verify
Check if Vulnerable:
Test if Pile API endpoints are accessible without authentication by attempting to access management functions
Check Version:
Check firmware version through charging station web interface or management console
Verify Fix Applied:
Verify authentication is required for all Pile API endpoints after patch installation
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated API access to Pile endpoints
- Multiple failed authentication attempts followed by successful unauthenticated access
Network Indicators:
- Unusual traffic patterns to charging station API ports from unauthorized sources
- Credential harvesting patterns in network traffic
SIEM Query:
source_ip NOT IN authorized_ips AND destination_port IN [charging_station_ports] AND protocol = http