CVE-2024-11666

Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users  suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:echarge:salia_plcc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echarge:salia_plcc:-:*:*:*:*:*:*:*

History

03 Dec 2024, 15:40

Type Values Removed Values Added
First Time Echarge
Echarge salia Plcc
Echarge salia Plcc Firmware
References () https://www.onekey.com/resource/critical-vulnerabilities-in-ev-charging-stations-analysis-of-echarge-controllers - () https://www.onekey.com/resource/critical-vulnerabilities-in-ev-charging-stations-analysis-of-echarge-controllers - Exploit, Third Party Advisory
CPE cpe:2.3:o:echarge:salia_plcc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echarge:salia_plcc:-:*:*:*:*:*:*:*

25 Nov 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-24 23:15

Updated : 2024-12-03 15:40


NVD link : CVE-2024-11666

Mitre link : CVE-2024-11666

CVE.ORG link : CVE-2024-11666


JSON object : View

Products Affected

echarge

  • salia_plcc_firmware
  • salia_plcc
CWE
CWE-345

Insufficient Verification of Data Authenticity