Maxicharger Ac Ultra Firmware

10 CVEs product

Monthly

CVE-2025-6678 HIGH This Week

CVE-2025-6678 is an unauthenticated remote information disclosure vulnerability in Autel MaxiCharger AC Wallbox Commercial charging stations affecting the Pile API endpoint. An attacker can remotely access sensitive information including credentials without requiring authentication, enabling credential theft and potential further compromise of the charging infrastructure. The vulnerability has a CVSS 7.5 severity rating reflecting high confidentiality impact, and the lack of authentication requirements makes exploitation trivial.

Information Disclosure Authentication Bypass Maxicharger Dc Compact Pedestal Firmware Maxicharger Dc Compact Mobile Firmware Maxicharger Dh480 Firmware +6
NVD
CVSS 3.0
7.5
EPSS
0.2%
CVE-2025-5830 HIGH This Week

CVE-2025-5830 is a heap-based buffer overflow vulnerability in Autel MaxiCharger AC Wallbox Commercial EV chargers affecting the DLB_SlaveRegister message handler. Network-adjacent attackers can execute arbitrary code without authentication due to insufficient input validation on user-supplied data length before copying to a fixed-length buffer. This is a critical vulnerability affecting critical infrastructure (EV charging stations) with a CVSS score of 8.8 and high real-world exploitability due to the unauthenticated, network-adjacent attack vector.

RCE Buffer Overflow Maxicharger Single Charger Firmware Maxicharger Dc Compact Mobile Firmware Maxicharger Dh480 Firmware +6
NVD
CVSS 3.0
8.8
EPSS
0.1%
CVE-2025-5829 MEDIUM This Month

Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of JSON messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26330.

RCE Buffer Overflow Stack Overflow Maxicharger Dc Compact Pedestal Firmware Maxicharger Dc Compact Mobile Firmware +7
NVD
CVSS 3.0
6.8
EPSS
0.1%
CVE-2025-5828 MEDIUM This Month

Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328.

RCE Buffer Overflow Maxicharger Single Charger Firmware Maxicharger Ac Ultra Firmware Maxicharger Ac Pro Firmware +6
NVD
CVSS 3.0
6.8
EPSS
0.1%
CVE-2025-5827 HIGH This Week

CVE-2025-5827 is a stack-based buffer overflow vulnerability in the ble_process_esp32_msg function of Autel MaxiCharger AC Wallbox Commercial EV chargers that allows unauthenticated, network-adjacent attackers to execute arbitrary code with high impact. The vulnerability results from insufficient validation of user-supplied data length before copying to a fixed-size stack buffer, affecting commercial EV charging infrastructure without requiring authentication or user interaction.

RCE Buffer Overflow Maxicharger Ac Pro Firmware Maxicharger Dc Compact Mobile Firmware Maxicharger Ac Elite Business C50 Firmware +6
NVD
CVSS 3.0
8.8
EPSS
0.1%
CVE-2025-5826 MEDIUM This Month

CVE-2025-5826 is a security vulnerability (CVSS 6.3) that allows network-adjacent attackers. Remediation should follow standard vulnerability management procedures.

Code Injection Maxicharger Ac Elite Business C50 Firmware Maxicharger Ac Ultra Firmware Maxicharger Dc Hipower Firmware Maxicharger Dc Compact Pedestal Firmware +5
NVD
CVSS 3.0
6.3
EPSS
0.0%
CVE-2025-5825 HIGH This Week

CVE-2025-5825 is a firmware downgrade remote code execution vulnerability in Autel MaxiCharger AC Wallbox Commercial charging stations that allows network-adjacent attackers with Bluetooth pairing capability to execute arbitrary code by uploading a malicious firmware image without proper validation. The vulnerability has a CVSS score of 7.5 (High) with high confidentiality, integrity, and availability impact, though exploitation requires prior Bluetooth device pairing. This is a ZDI-coordinated disclosure (ZDI-CAN-26354) affecting commercial charging infrastructure.

RCE Maxicharger Dc Compact Pedestal Firmware Maxicharger Dh480 Firmware Maxicharger Dc Compact Mobile Firmware Maxicharger Ac Pro Firmware +5
NVD
CVSS 3.0
7.5
EPSS
0.1%
CVE-2025-5824 HIGH This Week

CVE-2025-5824 is an authentication bypass vulnerability in Autel MaxiCharger AC Wallbox Commercial that allows network-adjacent attackers to bypass authentication through insufficient origin validation in Bluetooth pairing requests. The vulnerability (formerly ZDI-CAN-26353) has a CVSS score of 7.5 with high confidentiality, integrity, and availability impact; exploitation requires prior ability to pair a malicious Bluetooth device with the target system. No KEV or active exploitation data was provided in the supplied intelligence, and patch availability status is not documented in the available information.

Authentication Bypass Maxicharger Ac Elite Business C50 Firmware Maxicharger Dc Fast Firmware Maxicharger Dc Compact Pedestal Firmware Maxicharger Dh480 Firmware +5
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-5823 MEDIUM This Month

Autel MaxiCharger AC Wallbox Commercial Serial Number Exposed Dangerous Method Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the Autel Technician API. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26351.

Information Disclosure Maxicharger Single Charger Firmware Maxicharger Dc Compact Pedestal Firmware Maxicharger Dh480 Firmware Maxicharger Dc Compact Mobile Firmware +5
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-5822 HIGH This Week

CVE-2025-5822 is a privilege escalation vulnerability in the Autel MaxiCharger AC Wallbox Commercial Technician API that allows authenticated attackers to escalate from low-privileged users to higher privilege levels, potentially gaining unauthorized access to administrative functions and sensitive charging station data. The vulnerability requires an attacker to first obtain a valid low-privileged API token, after which they can bypass authorization controls to access restricted resources. With a CVSS score of 8.8 and network-accessible attack vector, this represents a significant risk to commercial EV charging infrastructure.

Privilege Escalation Maxicharger Ac Ultra Firmware Maxicharger Single Charger Firmware Maxicharger Dc Compact Mobile Firmware Maxicharger Dc Compact Pedestal Firmware +5
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-6678
EPSS 0% CVSS 7.5
HIGH This Week

CVE-2025-6678 is an unauthenticated remote information disclosure vulnerability in Autel MaxiCharger AC Wallbox Commercial charging stations affecting the Pile API endpoint. An attacker can remotely access sensitive information including credentials without requiring authentication, enabling credential theft and potential further compromise of the charging infrastructure. The vulnerability has a CVSS 7.5 severity rating reflecting high confidentiality impact, and the lack of authentication requirements makes exploitation trivial.

Information Disclosure Authentication Bypass Maxicharger Dc Compact Pedestal Firmware +8
NVD
CVE-2025-5830
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-5830 is a heap-based buffer overflow vulnerability in Autel MaxiCharger AC Wallbox Commercial EV chargers affecting the DLB_SlaveRegister message handler. Network-adjacent attackers can execute arbitrary code without authentication due to insufficient input validation on user-supplied data length before copying to a fixed-length buffer. This is a critical vulnerability affecting critical infrastructure (EV charging stations) with a CVSS score of 8.8 and high real-world exploitability due to the unauthenticated, network-adjacent attack vector.

RCE Buffer Overflow Maxicharger Single Charger Firmware +8
NVD
CVE-2025-5829
EPSS 0% CVSS 6.8
MEDIUM This Month

Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of JSON messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26330.

RCE Buffer Overflow Stack Overflow +9
NVD
CVE-2025-5828
EPSS 0% CVSS 6.8
MEDIUM This Month

Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328.

RCE Buffer Overflow Maxicharger Single Charger Firmware +8
NVD
CVE-2025-5827
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-5827 is a stack-based buffer overflow vulnerability in the ble_process_esp32_msg function of Autel MaxiCharger AC Wallbox Commercial EV chargers that allows unauthenticated, network-adjacent attackers to execute arbitrary code with high impact. The vulnerability results from insufficient validation of user-supplied data length before copying to a fixed-size stack buffer, affecting commercial EV charging infrastructure without requiring authentication or user interaction.

RCE Buffer Overflow Maxicharger Ac Pro Firmware +8
NVD
CVE-2025-5826
EPSS 0% CVSS 6.3
MEDIUM This Month

CVE-2025-5826 is a security vulnerability (CVSS 6.3) that allows network-adjacent attackers. Remediation should follow standard vulnerability management procedures.

Code Injection Maxicharger Ac Elite Business C50 Firmware Maxicharger Ac Ultra Firmware +7
NVD
CVE-2025-5825
EPSS 0% CVSS 7.5
HIGH This Week

CVE-2025-5825 is a firmware downgrade remote code execution vulnerability in Autel MaxiCharger AC Wallbox Commercial charging stations that allows network-adjacent attackers with Bluetooth pairing capability to execute arbitrary code by uploading a malicious firmware image without proper validation. The vulnerability has a CVSS score of 7.5 (High) with high confidentiality, integrity, and availability impact, though exploitation requires prior Bluetooth device pairing. This is a ZDI-coordinated disclosure (ZDI-CAN-26354) affecting commercial charging infrastructure.

RCE Maxicharger Dc Compact Pedestal Firmware Maxicharger Dh480 Firmware +7
NVD
CVE-2025-5824
EPSS 0% CVSS 7.5
HIGH This Week

CVE-2025-5824 is an authentication bypass vulnerability in Autel MaxiCharger AC Wallbox Commercial that allows network-adjacent attackers to bypass authentication through insufficient origin validation in Bluetooth pairing requests. The vulnerability (formerly ZDI-CAN-26353) has a CVSS score of 7.5 with high confidentiality, integrity, and availability impact; exploitation requires prior ability to pair a malicious Bluetooth device with the target system. No KEV or active exploitation data was provided in the supplied intelligence, and patch availability status is not documented in the available information.

Authentication Bypass Maxicharger Ac Elite Business C50 Firmware Maxicharger Dc Fast Firmware +7
NVD
CVE-2025-5823
EPSS 0% CVSS 6.5
MEDIUM This Month

Autel MaxiCharger AC Wallbox Commercial Serial Number Exposed Dangerous Method Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the Autel Technician API. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to disclose credentials, leading to further compromise. Was ZDI-CAN-26351.

Information Disclosure Maxicharger Single Charger Firmware Maxicharger Dc Compact Pedestal Firmware +7
NVD
CVE-2025-5822
EPSS 0% CVSS 8.8
HIGH This Week

CVE-2025-5822 is a privilege escalation vulnerability in the Autel MaxiCharger AC Wallbox Commercial Technician API that allows authenticated attackers to escalate from low-privileged users to higher privilege levels, potentially gaining unauthorized access to administrative functions and sensitive charging station data. The vulnerability requires an attacker to first obtain a valid low-privileged API token, after which they can bypass authorization controls to access restricted resources. With a CVSS score of 8.8 and network-accessible attack vector, this represents a significant risk to commercial EV charging infrastructure.

Privilege Escalation Maxicharger Ac Ultra Firmware Maxicharger Single Charger Firmware +7
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy