CVE-2025-5824

Autel MaxiCharger AC Wallbox Commercial Origin Validation Error Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Wallbox Commercial. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the handling of bluetooth pairing requests. The issue results from insufficient validation of the origin of commands. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26353.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_pro:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_ultra:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_mobile:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_pedestal:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_fast:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_hipower:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dh480:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_single_charger:-:*:*:*:*:*:*:*

History

10 Sep 2025, 14:46

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-25-343/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-343/ - Third Party Advisory
CPE cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:h:autel:maxicharger_ac_ultra:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_mobile:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:autel:maxicharger_dh480:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_pedestal:-:*:*:*:*:*:*:*
cpe:2.3:h:autel:maxicharger_single_charger:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_fast:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_hipower:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:american_standard
CVSS v2 : unknown
v3 : 5.0
v2 : unknown
v3 : 7.5
First Time Autel maxicharger Ac Pro
Autel maxicharger Dc Compact Pedestal
Autel maxicharger Ac Ultra Firmware
Autel maxicharger Dc Compact Mobile
Autel maxicharger Ac Pro Firmware
Autel maxicharger Dc Fast
Autel maxicharger Ac Elite Business C50
Autel
Autel maxicharger Dc Hipower
Autel maxicharger Dc Compact Pedestal Firmware
Autel maxicharger Single Charger Firmware
Autel maxicharger Dc Fast Firmware
Autel maxicharger Dc Compact Mobile Firmware
Autel maxicharger Dc Hipower Firmware
Autel maxicharger Ac Elite Business C50 Firmware
Autel maxicharger Single Charger
Autel maxicharger Dh480 Firmware
Autel maxicharger Ac Ultra
Autel maxicharger Dh480

26 Jun 2025, 18:57

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de omisión de autenticación por error de validación de origen en Autel MaxiCharger AC Wallbox Commercial. Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticación en las instalaciones afectadas de Autel MaxiCharger AC Wallbox Commercial. Para explotar esta vulnerabilidad, un atacante debe primero emparejar un dispositivo Bluetooth malicioso con el sistema objetivo. La falla específica se encuentra en la gestión de solicitudes de emparejamiento Bluetooth. El problema se debe a una validación insuficiente del origen de los comandos. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticación en el sistema. Anteriormente, se conocía como ZDI-CAN-26353.

25 Jun 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-25 18:15

Updated : 2025-09-10 14:46


NVD link : CVE-2025-5824

Mitre link : CVE-2025-5824

CVE.ORG link : CVE-2025-5824


JSON object : View

Products Affected

autel

  • maxicharger_dh480_firmware
  • maxicharger_ac_pro_firmware
  • maxicharger_dc_hipower_firmware
  • maxicharger_dc_compact_mobile
  • maxicharger_dc_compact_mobile_firmware
  • maxicharger_dc_fast_firmware
  • maxicharger_single_charger
  • maxicharger_ac_ultra
  • maxicharger_dh480
  • maxicharger_single_charger_firmware
  • maxicharger_ac_elite_business_c50_firmware
  • maxicharger_dc_compact_pedestal_firmware
  • maxicharger_dc_compact_pedestal
  • maxicharger_dc_fast
  • maxicharger_ac_pro
  • maxicharger_dc_hipower
  • maxicharger_ac_ultra_firmware
  • maxicharger_ac_elite_business_c50
CWE
CWE-346

Origin Validation Error