The server in Circontrol Raption through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain run-time control of the device as root. The ocpp1.5 and pwrstudio binaries on the charging station do not use a number of common exploitation mitigations. In particular, there are no stack canaries and they do not use the Position Independent Executable (PIE) format.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-04-12T00:00:00
Updated: 2024-08-04T09:48:25.104Z
Reserved: 2020-01-27T00:00:00
Link: CVE-2020-8006
Vulnrichment
Updated: 2024-08-04T09:48:25.104Z
NVD
Status : Awaiting Analysis
Published: 2024-04-12T12:15:41.467
Modified: 2024-11-21T05:38:12.083
Link: CVE-2020-8006
Redhat
No data.