Description
Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated usersĀ suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.
INFO
Published Date :
2024-11-24T22:36:59.989Z
Last Modified :
2024-11-25T01:28:57.027Z
Source :
ONEKEY
AFFECTED PRODUCTS
The following products are affected by CVE-2024-11666 vulnerability.
| Vendors | Products |
|---|---|
| Echarge |
|
| Hardy-barth |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-11666.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact