First published: Tue Aug 20 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Elite Business C50 EV chargers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the AppAuthenExchangeRandomNum BLE command. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
Autel MaxiCharger |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-24-1154 is classified as a critical vulnerability due to its ability to allow arbitrary code execution without authentication.
To mitigate ZDI-24-1154, users should apply the latest firmware updates provided by Autel for the MaxiCharger AC Elite Business C50.
ZDI-24-1154 affects installations of Autel MaxiCharger AC Elite Business C50 EV chargers that are network-adjacent.
ZDI-24-1154 can be exploited by network-adjacent attackers, meaning physical proximity to the device is necessary for exploitation.
ZDI-24-1154 enables attackers to execute arbitrary code on the affected systems, potentially compromising their functionality.