Vestel AC Charger
version

3.75.0 contains a vulnerability that
could enable an attacker to access files containing sensitive
information, such as credentials which could be used to further
compromise the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-11975 Vestel AC Charger version 3.75.0 contains a vulnerability that could enable an attacker to access files containing sensitive information, such as credentials which could be used to further compromise the device.
Fixes

Solution

Vestel strongly suggests that users of the related AC chargers update to version V3.187 or a higher version.


Workaround

Avoid using open network: * Use secure methods like virtual private networks (VPNs) for remote access. Regularly update VPNs to their latest versions and ensure that connected devices maintain strong security measures. * Reduce network exposure for applications and endpoints. Only make them accessible via the Internet if specifically designed for and required by their intended use. Login Credentials Management: * Force end user to revise the factory default set username and password of webconfig page. * Remove any printed documents such as installation guide, instruction book, quick start guide from web where login credentials are featured. Please refer to Vestel's advisory https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf for more information.

History

Fri, 25 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Apr 2025 23:30:00 +0000

Type Values Removed Values Added
Description Vestel AC Charger version 3.75.0 contains a vulnerability that could enable an attacker to access files containing sensitive information, such as credentials which could be used to further compromise the device.
Title Vestel AC Charger Exposure of Sensitive System Information to an Unauthorized Control Sphere
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-25T16:02:38.056Z

Reserved: 2025-04-14T19:44:14.176Z

Link: CVE-2025-3606

cve-icon Vulnrichment

Updated: 2025-04-25T15:37:28.871Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-25T00:15:15.807

Modified: 2025-04-29T13:52:28.490

Link: CVE-2025-3606

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses