Description

Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated usersĀ  suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.

INFO

Published Date :

2024-11-24T22:36:59.989Z

Last Modified :

2024-11-25T01:28:57.027Z

Source :

ONEKEY
AFFECTED PRODUCTS

The following products are affected by CVE-2024-11666 vulnerability.

Vendors Products
Echarge
  • Salia Plcc
  • Salia Plcc Firmware
Hardy-barth
  • Cph2 Echarge Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-11666.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact