We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.
Reserved 2024-03-05 | Published 2024-05-14 | Updated 2024-08-02 | Assigner CERTVDECWE-20 Improper Input Validation
Trend Micro's Zero Day Initiative
@ByteInsight
cert.vde.com/en/advisories/VDE-2024-019
Support options