The server in Circontrol Raption through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain run-time control of the device as root. The ocpp1.5 and pwrstudio binaries on the charging station do not use a number of common exploitation mitigations. In particular, there are no stack canaries and they do not use the Position Independent Executable (PIE) format.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Jun 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Circontrol
Circontrol raption Server |
|
| CPEs | cpe:2.3:a:circontrol:raption_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Circontrol
Circontrol raption Server |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T18:14:15.734Z
Reserved: 2020-01-27T00:00:00.000Z
Link: CVE-2020-8006
Updated: 2025-11-04T18:14:15.734Z
Status : Modified
Published: 2024-04-12T12:15:41.467
Modified: 2025-11-04T19:15:40.023
Link: CVE-2020-8006
No data.
OpenCVE Enrichment
No data.
Weaknesses