The server in Circontrol Raption through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain run-time control of the device as root. The ocpp1.5 and pwrstudio binaries on the charging station do not use a number of common exploitation mitigations. In particular, there are no stack canaries and they do not use the Position Independent Executable (PIE) format.
CVSS
No CVSS.
References
Configurations
History
17 Jun 2025, 21:01
Type | Values Removed | Values Added |
---|---|---|
First Time |
Circontrol raption Server
Circontrol |
|
CPE | cpe:2.3:a:circontrol:raption_server:*:*:*:*:*:*:*:* | |
References | () https://seclists.org/fulldisclosure/2024/Mar/33 - Mailing List | |
References | () https://circontrol.com/intelligent-charging-solutions/dc-chargers-series/raption-150/ - Product |
12 Apr 2024, 12:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-12 12:15
Updated : 2025-06-17 21:01
NVD link : CVE-2020-8006
Mitre link : CVE-2020-8006
JSON object : View
Products Affected
circontrol
- raption_server
CWE
No CWE.