{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T15:23:14.965","vulnerabilities":[{"cve":{"id":"CVE-2023-29114","sourceIdentifier":"cve@asrg.io","published":"2024-11-05T15:15:21.443","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"System logs could be accessed through web management application due to a lack of access control.\n\n\nAn attacker can obtain the following sensitive information:\n\n•     Wi-Fi access point credentials to which the EV charger can connect.\n\n•     APN web address and credentials.\n\n•     IPSEC credentials.\n\n•     Web interface access credentials for user and admin accounts.\n\n•     JuiceBox system components (software installed, model, firmware version, etc.).\n\n•     C2G configuration details.\n\n•     Internal IP addresses.\n\n•     OTA firmware update configurations (DNS servers).\n\nAll the credentials are stored in logs in an unencrypted plaintext format."},{"lang":"es","value":"Se puede acceder a los registros del sistema a través de la aplicación de administración web debido a la falta de control de acceso. Un atacante puede obtener la siguiente información confidencial: • Credenciales del punto de acceso Wi-Fi al que se puede conectar el cargador EV. • Dirección web y credenciales APN. • Credenciales IPSEC. • Credenciales de acceso a la interfaz web para cuentas de usuario y administrador. • Componentes del sistema JuiceBox (software instalado, modelo, versión de firmware, etc.). • Detalles de configuración de C2G. • Direcciones IP internas. • Configuraciones de actualización de firmware OTA (servidores DNS). Todas las credenciales se almacenan en registros en un formato de texto plano."}],"metrics":{"cvssMetricV31":[{"source":"cve@asrg.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":3.6}]},"weaknesses":[{"source":"cve@asrg.io","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"references":[{"url":"https://support-emobility.enelx.com/content/dam/enelxmobility/italia/documenti/manuali-schede-tecniche/Waybox-3-Security-Bulletin-06-2024-V1.pdf","source":"cve@asrg.io"}]}}]}