{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T06:39:19.371","vulnerabilities":[{"cve":{"id":"CVE-2025-5749","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-06-06T16:15:30.120","lastModified":"2025-08-14T15:37:47.553","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295."},{"lang":"es","value":"Vulnerabilidad de omisión de autenticación de variables no inicializadas en las claves de cifrado del cargador de vehículos eléctricos WOLFBOX Nivel 2 BLE. Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticación en las instalaciones afectadas de cargadores de vehículos eléctricos WOLFBOX Nivel 2. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en el manejo de las claves criptográficas utilizadas en las comunicaciones cifradas específicas del proveedor. El problema se debe a la falta de inicialización correcta de una variable antes de acceder a ella. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticación en el sistema. Anteriormente, se denominó ZDI-CAN-26295."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-457"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*","matchCriteriaId":"7DA2D942-F877-4620-A470-63275137F55F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*","matchCriteriaId":"27090DB5-F57A-486A-94FF-3B38C1A35613"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-328/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}