CVE-2024-12605
Jue, 09/01/2025 – 11:15
CVE-2024-12605
CVE-2024-12605
Jue, 09/01/2025 – 11:15
CVE-2024-12605
CVE-2024-12542
Jue, 09/01/2025 – 11:15
CVE-2024-12542
CVE-2024-12848
Jue, 09/01/2025 – 11:15
CVE-2024-12848
CVE-2024-12819
Jue, 09/01/2025 – 11:15
CVE-2024-12819
CVE-2024-12621
Jue, 09/01/2025 – 11:15
CVE-2024-12621
CVE-2024-12618
Jue, 09/01/2025 – 11:15
CVE-2024-12618
CVE-2025-0349
Jue, 09/01/2025 – 11:15
CVE-2025-0349
CVE-2024-6155
Jue, 09/01/2025 – 11:15
CVE-2024-6155
CVE-2024-5769
Jue, 09/01/2025 – 11:15
CVE-2024-5769
CVE-2024-43658
Jue, 09/01/2025 – 08:15
CVE-2024-43658
Likelihood: High, but requires authentication
Impact: Critical – The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.
CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y).