ID

VAR-202506-0616


CVE

CVE-2025-5829


TITLE

plural  autel  Stack-based buffer overflow vulnerability in products

Trust: 0.8

sources: JVNDB: JVNDB-2025-013687

DESCRIPTION

Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of JSON messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26330. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a stack-based buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company. The vulnerability is caused by the JSON message failing to properly validate the length of the input data

Trust: 2.79

sources: NVD: CVE-2025-5829 // JVNDB: JVNDB-2025-013687 // ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-14947

AFFECTED PRODUCTS

vendor:autelmodel:maxicharger ac ultrascope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact pedestalscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc fastscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact mobilescope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger dh480scope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc hipowerscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger single chargerscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger ac proscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger ac elite business c50scope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact pedestalscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger single chargerscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger ac ultrascope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger dc fastscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger dc hipowerscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dh480scope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger ac proscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact mobilescope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger ac elite business c50scope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger single chargerscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac proscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc compact mobilescope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc compact pedestalscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc fastscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac elite business c50scope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac ultrascope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc hipowerscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dh480scope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac wallbox commercialscope: - version: -

Trust: 0.7

vendor:autelmodel:maxicharger ac wallbox commercial <v1.39.51scope: - version: -

Trust: 0.6

vendor:autelmodel:maxicharger ac wallbox commercial <v1.56.51scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947 // JVNDB: JVNDB-2025-013687 // NVD: CVE-2025-5829

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2025-5829
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-013687
value: MEDIUM

Trust: 0.8

ZDI: CVE-2025-5829
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2025-14947
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-14947
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2025-5829
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2025-013687
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2025-5829
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947 // JVNDB: JVNDB-2025-013687 // NVD: CVE-2025-5829

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-013687 // NVD: CVE-2025-5829

PATCH

title:Patch for Autel MaxiCharger AC Wallbox Commercial Buffer Overflow Vulnerability (CNVD-2025-14947)url:https://www.cnvd.org.cn/patchInfo/show/704531

Trust: 0.6

sources: CNVD: CNVD-2025-14947

EXTERNAL IDS

db:NVDid:CVE-2025-5829

Trust: 3.9

db:ZDIid:ZDI-25-348

Trust: 3.1

db:JVNDBid:JVNDB-2025-013687

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-26330

Trust: 0.7

db:CNVDid:CNVD-2025-14947

Trust: 0.6

sources: ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947 // JVNDB: JVNDB-2025-013687 // NVD: CVE-2025-5829

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-25-348/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2025-5829

Trust: 0.8

sources: CNVD: CNVD-2025-14947 // JVNDB: JVNDB-2025-013687 // NVD: CVE-2025-5829

CREDITS

Tobias Scharnowski, Felix Buchmann, and Kristian Covic of fuzzware.io

Trust: 0.7

sources: ZDI: ZDI-25-348

SOURCES

db:ZDIid:ZDI-25-348
db:CNVDid:CNVD-2025-14947
db:JVNDBid:JVNDB-2025-013687
db:NVDid:CVE-2025-5829

LAST UPDATE DATE

2025-09-14T23:37:51.731000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-348date:2025-06-11T00:00:00
db:CNVDid:CNVD-2025-14947date:2025-07-03T00:00:00
db:JVNDBid:JVNDB-2025-013687date:2025-09-11T07:59:00
db:NVDid:CVE-2025-5829date:2025-09-10T14:46:38.487

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-348date:2025-06-11T00:00:00
db:CNVDid:CNVD-2025-14947date:2025-07-03T00:00:00
db:JVNDBid:JVNDB-2025-013687date:2025-09-11T00:00:00
db:NVDid:CVE-2025-5829date:2025-06-25T18:15:23.817