{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T17:47:22.936","vulnerabilities":[{"cve":{"id":"CVE-2025-5751","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-06-06T16:15:30.413","lastModified":"2025-08-14T15:25:26.630","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292."},{"lang":"es","value":"Vulnerabilidad de omisión de autenticación de credenciales codificadas de forma rígida en la tarjeta de administración del cargador de vehículos eléctricos WOLFBOX Nivel 2. Esta vulnerabilidad permite a atacantes presentes físicamente omitir la autenticación en las instalaciones afectadas del cargador de vehículos eléctricos WOLFBOX Nivel 2. No se requiere autenticación para explotar esta vulnerabilidad. La falla específica se encuentra en el manejo de las tarjetas de administración. El problema se debe a la falta de personalización de estas. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticación en el sistema. Se denominó ZDI-CAN-26292."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}],"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":4.6,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":3.6}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-798"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*","matchCriteriaId":"7DA2D942-F877-4620-A470-63275137F55F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*","matchCriteriaId":"27090DB5-F57A-486A-94FF-3B38C1A35613"}]}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-25-330/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}