Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated usersĀ  suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.

IT Brew


From cybersecurity and big data to software development, IT Brew delivers the latest news and analysis of trends shaping the IT industry, like only The Brew can.

Listed: