Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated usersĀ  suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.

Sicehice


Sicehice automates the collection of cyber threat intelligence from over 30 sources and enables users to search against the collected IPs. It is possible that there will be false positives in our dataset. We are a small group that cannot vet all indicators gathered on an hourly basis.

Listed: