CVE-2025-5751

WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*
cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*

History

14 Aug 2025, 15:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
First Time Wolfbox level 2 Ev Charger
Wolfbox level 2 Ev Charger Firmware
Wolfbox
CPE cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*
cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-25-330/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-330/ - Third Party Advisory

06 Jun 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-06 16:15

Updated : 2025-08-14 15:25


NVD link : CVE-2025-5751

Mitre link : CVE-2025-5751


JSON object : View

Products Affected

wolfbox

  • level_2_ev_charger
  • level_2_ev_charger_firmware
CWE
CWE-798

Use of Hard-coded Credentials