Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability
Vulnerability Description
WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installatons of WOLFBOX Level 2 EV Charger devices. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of command frames received by the MCU. When parsing frames, the process does not properly detect the start of a frame, which can lead to misinterpretation of input. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26501.
CVSS Information
N/A
Vulnerability Type
输入的错误解释
Vulnerability Title
WOLFBOX Level 2 EV Charger 安全漏洞
Vulnerability Description
WOLFBOX Level 2 EV Charger是WOLFBOX公司的一个电动汽车充电器。 WOLFBOX Level 2 EV Charger存在安全漏洞,该漏洞源于MCU处理命令帧时未正确检测帧起始,可能导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A