CVE-2025-5749
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-06

Last updated on: 2025-08-14

Assigner: Zero Day Initiative

Description
WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2025-08-14
Generated
2026-05-07
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wolfbox level_2_ev_charger_firmware 3.1.17
wolfbox level_2_ev_charger *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-457 The code uses a variable that has not been initialized, leading to unpredictable or unintended results.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in WOLFBOX Level 2 EV Charger devices is due to an uninitialized variable used in handling cryptographic keys for vendor-specific encrypted BLE communications. Because the variable is not properly initialized, network-adjacent attackers can bypass authentication on the device without needing any privileges or user interaction. [1]


How can this vulnerability impact me? :

An attacker who is on a network adjacent to the affected WOLFBOX Level 2 EV Charger device can bypass authentication, potentially gaining unauthorized access to the device. This can impact the confidentiality, integrity, and availability of the device and its communications. [1]


What immediate steps should I take to mitigate this vulnerability?

Since no remediation or patch from WOLFBOX is available and attempts to contact the vendor were unsuccessful, immediate mitigation steps include restricting network access to the affected WOLFBOX Level 2 EV Charger devices, especially limiting BLE communications to trusted devices only, and monitoring for unusual BLE activity. Additionally, consider isolating the devices on a separate network segment to reduce exposure to network-adjacent attackers. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart