Description
A security vulnerability has been detected in Besen BS20 EV Charging Station up to 20260426. This affects an unknown part of the component BLE/WiFi. Such manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The original disclosure mentions, that "[t]hese vulnerabilities have been reported to Besen and we have received their acknowlegement that they are reviewing this as of April 2026."
Problem types
Authentication Bypass by Capture-replay
Product status
Timeline
| 2026-05-24: | Advisory disclosed |
| 2026-05-24: | VulDB entry created |
| 2026-05-24: | VulDB entry last update |
Credits
carfeii (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/365379 (VDB-365379 | Besen BS20 EV Charging Station BLE/WiFi authentication replay)
vuldb.com/vuln/365379/cti (VDB-365379 | CTI Indicators (IOB, IOC, TTP))
vuldb.com/submit/813577 (Submit #813577 | Besen EV Charging Station BS20 EV Charger Improper Authorization)
github.com/carfeii/besen