Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-5747


WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installatons of WOLFBOX Level 2 EV Charger devices. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of command frames received by the MCU. When parsing frames, the process does not properly detect the start of a frame, which can lead to misinterpretation of input. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26501.


Published

2025-06-06T16:15:29.803

Last Modified

2025-08-14T15:38:22.347

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.0: 8.0 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-115

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System wolfbox level_2_ev_charger_firmware 3.1.17 Yes
Hardware wolfbox level_2_ev_charger - No

References