We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-43658

Using the <redacted> action or <redacted>.sh script, arbitrary files and directories can be deleted using directory traversal.



Description

Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files This issue affects Iocharger firmware for AC model before firmware version 25010801. Likelihood: High, but requires authentication Impact: Critical – The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station. CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y).

Reserved 2024-08-14 | Published 2025-01-09 | Updated 2025-01-09 | Assigner DIVD


HIGH: 7.2CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y

Problem types

CWE-27 Patch traversal

CWE-73 External Control of File Name or Path

Product status

Default status
unaffected

Any version before 25010801
affected

Credits

Wilco van Beijnum finder

Harm van den Brink (DIVD) analyst

Frank Breedijk (DIVD) analyst

References

csirt.divd.nl/DIVD-2024-00035/ third-party-advisory

csirt.divd.nl/CVE-2024-43658/ third-party-advisory

iocharger.com product

cve.org (CVE-2024-43658)

nvd.nist.gov (CVE-2024-43658)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-43658

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.