Loading HuntDB...

GHSA-wpcm-3jpv-h3x5

GitHub Security Advisory

⚠ Unreviewed CRITICAL Has CVE

Advisory Details

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability allows OS Command Injection as root
This issue affects Iocharger firmware for AC model chargers before version 24120701

Likelihood: Moderate – The <redacted> binary does not seem to be used by the web interface, so it might be more difficult to find. It seems to be largely the same binary as used by the Iocharger Pedestal charging station, however. The attacker will also need a (low privilege) account to gain access to the <redacted> binary, or convince a user with such access to execute a crafted HTTP request.

Impact: Critical – The attacker has full control over the charging station as the root user, and can arbitrarily add, modify and delete
files and services.

Related CVEs

Key Information

GHSA ID
GHSA-wpcm-3jpv-h3x5
Published
January 9, 2025 9:31 AM
Last Modified
January 9, 2025 3:31 PM
CVSS Score
9.0 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: July 14, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.