First published: Fri Jan 31 2025(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the wlanchnllst function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ChargePoint Home Flex Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23969 is classified as a critical vulnerability due to the potential for remote code execution without authentication.
To mitigate CVE-2024-23969, update the ChargePoint Home Flex charging station to the latest firmware version that addresses this vulnerability.
CVE-2024-23969 affects installations of ChargePoint Home Flex charging stations, particularly those operating on vulnerable firmware.
CVE-2024-23969 can be exploited by network-adjacent attackers to execute arbitrary code on the affected systems.
No, CVE-2024-23969 does not require authentication, making it easier for attackers to exploit.