CVE-2025-5825

Autel MaxiCharger AC Wallbox Commercial Firmware Downgrade Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability. The specific flaw exists within the firmware update process. The issue results from the lack of proper validation of a firmware image before using it to perform an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26354.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_pro:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_ultra:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_mobile:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_pedestal:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_fast:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_hipower:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dh480:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_single_charger:-:*:*:*:*:*:*:*

History

10 Sep 2025, 14:46

Type Values Removed Values Added
First Time Autel maxicharger Ac Pro
Autel maxicharger Dc Compact Pedestal
Autel maxicharger Ac Ultra Firmware
Autel maxicharger Dc Compact Mobile
Autel maxicharger Ac Pro Firmware
Autel maxicharger Dc Fast
Autel maxicharger Ac Elite Business C50
Autel
Autel maxicharger Dc Hipower
Autel maxicharger Dc Compact Pedestal Firmware
Autel maxicharger Single Charger Firmware
Autel maxicharger Dc Fast Firmware
Autel maxicharger Dc Compact Mobile Firmware
Autel maxicharger Dc Hipower Firmware
Autel maxicharger Ac Elite Business C50 Firmware
Autel maxicharger Single Charger
Autel maxicharger Dh480 Firmware
Autel maxicharger Ac Ultra
Autel maxicharger Dh480
CPE cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_elite_business_c50:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_ac_pro_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:h:autel:maxicharger_ac_ultra:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_mobile:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_ac_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:autel:maxicharger_dh480:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_single_charger_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_pedestal_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_compact_pedestal:-:*:*:*:*:*:*:*
cpe:2.3:h:autel:maxicharger_single_charger:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_ac_elite_business_c50_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_fast:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_dh480_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:h:autel:maxicharger_dc_hipower:-:*:*:*:*:*:*:*
cpe:2.3:o:autel:maxicharger_dc_fast_firmware:*:*:*:*:*:*:*:european_standard
cpe:2.3:o:autel:maxicharger_dc_hipower_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_dc_compact_mobile_firmware:*:*:*:*:*:*:*:american_standard
cpe:2.3:o:autel:maxicharger_ac_ultra_firmware:*:*:*:*:*:*:*:american_standard
References () https://www.zerodayinitiative.com/advisories/ZDI-25-344/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-344/ - Third Party Advisory

26 Jun 2025, 18:57

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de ejecución remota de código en la degradación del firmware de Autel MaxiCharger AC Wallbox Commercial. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar código arbitrario en las instalaciones afectadas de las estaciones de carga Autel MaxiCharger AC Wallbox Commercial. Para explotar esta vulnerabilidad, un atacante debe primero vincular un dispositivo Bluetooth malicioso con el sistema objetivo. La falla específica se encuentra en el proceso de actualización del firmware. El problema se debe a la falta de validación adecuada de una imagen de firmware antes de usarla para realizar una actualización. Un atacante puede aprovechar esto, junto con otras vulnerabilidades, para ejecutar código arbitrario en el dispositivo. Anteriormente, se denominaba ZDI-CAN-26354.

25 Jun 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-25 18:15

Updated : 2025-09-10 14:46


NVD link : CVE-2025-5825

Mitre link : CVE-2025-5825

CVE.ORG link : CVE-2025-5825


JSON object : View

Products Affected

autel

  • maxicharger_dh480_firmware
  • maxicharger_ac_pro_firmware
  • maxicharger_dc_hipower_firmware
  • maxicharger_dc_compact_mobile
  • maxicharger_dc_compact_mobile_firmware
  • maxicharger_dc_fast_firmware
  • maxicharger_single_charger
  • maxicharger_ac_ultra
  • maxicharger_dh480
  • maxicharger_single_charger_firmware
  • maxicharger_ac_elite_business_c50_firmware
  • maxicharger_dc_compact_pedestal_firmware
  • maxicharger_dc_compact_pedestal
  • maxicharger_dc_fast
  • maxicharger_ac_pro
  • maxicharger_dc_hipower
  • maxicharger_ac_ultra_firmware
  • maxicharger_ac_elite_business_c50
CWE
CWE-1328

Security Version Number Mutable to Older Versions