Home

Description

Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of USB frame packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26328.

PUBLISHED Reserved 2025-06-06 | Published 2025-06-25 | Updated 2025-06-26 | Assigner zdi




MEDIUM: 6.8CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

1.36.00
affected

References

www.zerodayinitiative.com/advisories/ZDI-25-347/ (ZDI-25-347)

cve.org (CVE-2025-5828)

nvd.nist.gov (CVE-2025-5828)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.