ID

VAR-202506-0616


CVE

CVE-2025-5829


TITLE

(Pwn2Own) Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-25-348

DESCRIPTION

Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of JSON messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26330. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company. The vulnerability is caused by the JSON message failing to properly validate the length of the input data

Trust: 2.07

sources: NVD: CVE-2025-5829 // ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-14947

AFFECTED PRODUCTS

vendor:autelmodel:maxicharger ac wallbox commercialscope: - version: -

Trust: 0.7

vendor:autelmodel:maxicharger ac wallbox commercial <v1.39.51scope: - version: -

Trust: 0.6

vendor:autelmodel:maxicharger ac wallbox commercial <v1.56.51scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2025-5829
value: MEDIUM

Trust: 1.0

ZDI: CVE-2025-5829
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2025-14947
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-14947
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2025-5829
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.0

ZDI: CVE-2025-5829
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947 // NVD: CVE-2025-5829

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2025-5829

PATCH

title:Patch for Autel MaxiCharger AC Wallbox Commercial Buffer Overflow Vulnerability (CNVD-2025-14947)url:https://www.cnvd.org.cn/patchInfo/show/704531

Trust: 0.6

sources: CNVD: CNVD-2025-14947

EXTERNAL IDS

db:NVDid:CVE-2025-5829

Trust: 2.3

db:ZDIid:ZDI-25-348

Trust: 2.3

db:ZDI_CANid:ZDI-CAN-26330

Trust: 0.7

db:CNVDid:CNVD-2025-14947

Trust: 0.6

sources: ZDI: ZDI-25-348 // CNVD: CNVD-2025-14947 // NVD: CVE-2025-5829

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-25-348/

Trust: 1.6

sources: CNVD: CNVD-2025-14947 // NVD: CVE-2025-5829

CREDITS

Tobias Scharnowski, Felix Buchmann, and Kristian Covic of fuzzware.io

Trust: 0.7

sources: ZDI: ZDI-25-348

SOURCES

db:ZDIid:ZDI-25-348
db:CNVDid:CNVD-2025-14947
db:NVDid:CVE-2025-5829

LAST UPDATE DATE

2025-07-04T23:42:49.268000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-348date:2025-06-11T00:00:00
db:CNVDid:CNVD-2025-14947date:2025-07-03T00:00:00
db:NVDid:CVE-2025-5829date:2025-06-26T18:57:43.670

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-348date:2025-06-11T00:00:00
db:CNVDid:CNVD-2025-14947date:2025-07-03T00:00:00
db:NVDid:CVE-2025-5829date:2025-06-25T18:15:23.817