CVE-2025-52264
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-10-30
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| starcharge | artemis_ac_charger | 1.0.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in StarCharge Artemis AC Charger 7-22 kW v1.0.4 is a stack overflow occurring via the cgiMain function at download.cgi. This means that the software handling requests at download.cgi does not properly manage memory on the stack, which can lead to unexpected behavior or exploitation.
How can this vulnerability impact me? :
A stack overflow vulnerability can allow an attacker to execute arbitrary code, cause the device to crash, or disrupt normal operation. This could lead to unauthorized control over the charger, denial of service, or other security breaches affecting the availability and integrity of the charging system.