CVE-2024-23959

Autel MaxiCharger AC Elite Business C50 BLE AppChargingControl Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the AppChargingControl BLE command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23194
References
Link Resource
https://www.zerodayinitiative.com/advisories/ZDI-24-851/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:1.32.00:*:*:*:*:*:*:*
cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*

History

03 Oct 2024, 17:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
CPE cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:1.32.00:*:*:*:*:*:*:*
First Time Autel maxicharger Ac Elite Business C50 Firmware
Autel maxicharger Ac Elite Business C50
Autel
CWE CWE-787
References () https://www.zerodayinitiative.com/advisories/ZDI-24-851/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-851/ - Third Party Advisory, VDB Entry

28 Sep 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-28 07:15

Updated : 2024-10-03 17:42


NVD link : CVE-2024-23959

Mitre link : CVE-2024-23959


JSON object : View

Products Affected

autel

  • maxicharger_ac_elite_business_c50_firmware
  • maxicharger_ac_elite_business_c50
CWE
CWE-787

Out-of-bounds Write