Patch traversal, External Control of File Name or Path vulnerability in  Iocharger Home allows deletion of arbitrary files
This issue affects Iocharger firmware for AC model before firmware version 25010801.
Likelihood: High, but requires authentication
Impact: Critical – The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.
CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y).
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 09 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 09 Jan 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files This issue affects Iocharger firmware for AC model before firmware version 25010801. Likelihood: High, but requires authentication Impact: Critical – The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station. CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y). | |
| Title | Using the <redacted> action or <redacted>.sh script, arbitrary files and directories can be deleted using directory traversal. | |
| Weaknesses | CWE-27 CWE-73 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: DIVD
Published: 2025-01-09T07:56:47.273Z
Updated: 2025-03-11T13:07:08.000Z
Reserved: 2024-08-14T09:27:41.769Z
Link: CVE-2024-43658
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-01-09T15:22:36.122Z
 NVD
                        NVD
                    Status : Received
Published: 2025-01-09T08:15:28.867
Modified: 2025-01-09T08:15:28.867
Link: CVE-2024-43658
 Redhat
                        Redhat
                    No data.