CVE-2025-5748
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-06

Last updated on: 2025-08-14

Assigner: Zero Day Initiative

Description
WOLFBOX Level 2 EV Charger LAN OTA Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Tuya communications module software. The issue results from the exposure of a method allowing the upload of crafted software images to the module. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26349.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2025-08-14
Generated
2026-05-07
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wolfbox level_2_ev_charger_firmware 3.1.17
wolfbox level_2_ev_charger *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-749 The product provides an Applications Programming Interface (API) or similar interface for interaction with external actors, but the interface includes a dangerous method or function that is not properly restricted.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the WOLFBOX Level 2 EV Charger and involves a flaw in the Tuya communications module software. It exposes a method that allows an attacker to upload crafted software images to the device. Although authentication is normally required, the authentication mechanism can be bypassed, enabling a network-adjacent attacker to execute arbitrary code on the device remotely. [1]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can execute arbitrary code on the affected EV charger, potentially gaining control over the device. This can lead to compromise of device confidentiality, integrity, and availability, meaning sensitive data could be exposed or altered, and the device could be disrupted or disabled. [1]


What immediate steps should I take to mitigate this vulnerability?

Since the vulnerability allows remote code execution via an exposed method in the Tuya communications module and authentication can be bypassed, immediate mitigation steps include restricting network access to the WOLFBOX Level 2 EV Charger devices to trusted networks only, disabling or isolating the affected Tuya communications module if possible, and monitoring for any unusual activity. As no official remediation or patch is available due to unsuccessful contact with the vendor, network-level controls and limiting exposure are critical. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart