Affected devices beacon to eCharge cloud infrastructure...
Critical severity
Unreviewed
Published
Nov 25, 2024
to the GitHub Advisory Database
•
Updated Nov 25, 2024
Description
Published by the National Vulnerability Database
Nov 24, 2024
Published to the GitHub Advisory Database
Nov 25, 2024
Last updated
Nov 25, 2024
Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices.
This issue affects cph2_echarge_firmware: through 2.0.4.
References