Home

Description

A security vulnerability has been detected in Besen BS20 EV Charging Station up to 20260426. This affects an unknown part of the component BLE/WiFi. Such manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The original disclosure mentions, that "[t]hese vulnerabilities have been reported to Besen and we have received their acknowlegement that they are reviewing this as of April 2026."

PUBLISHED Reserved 2026-05-24 | Published 2026-05-24 | Updated 2026-05-24 | Assigner VulDB




LOW: 2.3CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.1CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.1CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
1.8AV:A/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Authentication Bypass by Capture-replay

Improper Authentication

Product status

20260426
affected

Timeline

2026-05-24:Advisory disclosed
2026-05-24:VulDB entry created
2026-05-24:VulDB entry last update

Credits

carfeii (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/365379 (VDB-365379 | Besen BS20 EV Charging Station BLE/WiFi authentication replay) vdb-entry

vuldb.com/vuln/365379/cti (VDB-365379 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/submit/813577 (Submit #813577 | Besen EV Charging Station BS20 EV Charger Improper Authorization) third-party-advisory

github.com/carfeii/besen related

cve.org (CVE-2026-9398)

nvd.nist.gov (CVE-2026-9398)

Download JSON