ID

VAR-202506-0617


CVE

CVE-2025-5828


TITLE

plural  autel  Classic buffer overflow vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2025-013732

DESCRIPTION

Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328. maxicharger ac elite business c50 firmware, MaxiCharger AC Pro firmware, MaxiCharger AC Ultra firmware etc. autel The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Autel MaxiCharger AC Wallbox Commercial is a smart AI electric vehicle charger from Autel, a US company. The vulnerability is caused by the USB frame packet failing to correctly verify the length of the input data

Trust: 2.79

sources: NVD: CVE-2025-5828 // JVNDB: JVNDB-2025-013732 // ZDI: ZDI-25-347 // CNVD: CNVD-2025-14948

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-14948

AFFECTED PRODUCTS

vendor:autelmodel:maxicharger ac ultrascope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact pedestalscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc fastscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact mobilescope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger dh480scope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc hipowerscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger single chargerscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger ac proscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger ac elite business c50scope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact pedestalscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger single chargerscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger ac ultrascope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger dc fastscope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger dc hipowerscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dh480scope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger ac proscope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger dc compact mobilescope:ltversion:1.56.51

Trust: 1.0

vendor:autelmodel:maxicharger ac elite business c50scope:ltversion:1.39.51

Trust: 1.0

vendor:autelmodel:maxicharger single chargerscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac proscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc compact mobilescope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc compact pedestalscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc fastscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac elite business c50scope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac ultrascope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dc hipowerscope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger dh480scope: - version: -

Trust: 0.8

vendor:autelmodel:maxicharger ac wallbox commercialscope: - version: -

Trust: 0.7

vendor:autelmodel:maxicharger ac wallbox commercial <v1.39.51scope: - version: -

Trust: 0.6

vendor:autelmodel:maxicharger ac wallbox commercial <v1.56.51scope: - version: -

Trust: 0.6

sources: ZDI: ZDI-25-347 // CNVD: CNVD-2025-14948 // JVNDB: JVNDB-2025-013732 // NVD: CVE-2025-5828

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2025-5828
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2025-013732
value: MEDIUM

Trust: 0.8

ZDI: CVE-2025-5828
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2025-14948
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-14948
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2025-5828
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2025-013732
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2025-5828
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-347 // CNVD: CNVD-2025-14948 // JVNDB: JVNDB-2025-013732 // NVD: CVE-2025-5828

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-013732 // NVD: CVE-2025-5828

PATCH

title:Patch for Autel MaxiCharger AC Wallbox Commercial Buffer Overflow Vulnerability (CNVD-2025-14948)url:https://www.cnvd.org.cn/patchInfo/show/704536

Trust: 0.6

sources: CNVD: CNVD-2025-14948

EXTERNAL IDS

db:NVDid:CVE-2025-5828

Trust: 3.9

db:ZDIid:ZDI-25-347

Trust: 3.1

db:JVNDBid:JVNDB-2025-013732

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-26328

Trust: 0.7

db:CNVDid:CNVD-2025-14948

Trust: 0.6

sources: ZDI: ZDI-25-347 // CNVD: CNVD-2025-14948 // JVNDB: JVNDB-2025-013732 // NVD: CVE-2025-5828

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-25-347/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2025-5828

Trust: 0.8

sources: CNVD: CNVD-2025-14948 // JVNDB: JVNDB-2025-013732 // NVD: CVE-2025-5828

CREDITS

Synacktiv

Trust: 0.7

sources: ZDI: ZDI-25-347

SOURCES

db:ZDIid:ZDI-25-347
db:CNVDid:CNVD-2025-14948
db:JVNDBid:JVNDB-2025-013732
db:NVDid:CVE-2025-5828

LAST UPDATE DATE

2025-09-14T23:40:14.436000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-347date:2025-06-11T00:00:00
db:CNVDid:CNVD-2025-14948date:2025-07-03T00:00:00
db:JVNDBid:JVNDB-2025-013732date:2025-09-11T23:17:00
db:NVDid:CVE-2025-5828date:2025-09-10T14:46:41.230

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-347date:2025-06-11T00:00:00
db:CNVDid:CNVD-2025-14948date:2025-07-03T00:00:00
db:JVNDBid:JVNDB-2025-013732date:2025-09-12T00:00:00
db:NVDid:CVE-2025-5828date:2025-06-25T18:15:23.683